Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1546574
MD5:ab9a5055a57bf0ce6eb64d81699f6ac1
SHA1:4e4ac10f948fc734508def7d7389c986583ea8ad
SHA256:95f4d6588c28a487edcd91b95cebd864b43880aadcb6bd762474cf8733d4b4c0
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found API chain indicative of sandbox detection
Machine Learning detection for sample
Connects to many different domains
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 7484 cmdline: "C:\Users\user\Desktop\file.exe" MD5: AB9A5055A57BF0CE6EB64D81699F6AC1)
    • taskkill.exe (PID: 7500 cmdline: taskkill /F /IM firefox.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7596 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7652 cmdline: taskkill /F /IM msedge.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7660 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7716 cmdline: taskkill /F /IM opera.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7724 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 7784 cmdline: taskkill /F /IM brave.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7792 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • firefox.exe (PID: 7848 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • firefox.exe (PID: 7884 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
    • firefox.exe (PID: 7900 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 8140 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2248 -prefMapHandle 2240 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {681be74a-1bb9-45bf-a064-2568e5603787} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197a056d310 socket MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7608 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3936 -parentBuildID 20230927232528 -prefsHandle 3904 -prefMapHandle 3892 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8548365d-f205-4391-ba44-a87f283ec693} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197b276a710 rdd MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 2852 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5124 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4732 -prefMapHandle 5108 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1499095d-2804-4cb1-b508-9ad3baa802c6} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197a0574f10 utility MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000003.1721960630.00000000015CF000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    00000000.00000003.1722006831.00000000015D6000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
      Process Memory Space: file.exe PID: 7484JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
        No Sigma rule has matched
        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
        2024-11-01T06:17:14.266940+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449762TCP
        2024-11-01T06:17:52.536724+010020229301A Network Trojan was detected172.202.163.200443192.168.2.454328TCP

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: file.exeReversingLabs: Detection: 47%
        Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
        Source: file.exeJoe Sandbox ML: detected
        Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49743 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49745 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49750 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49759 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49769 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49770 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49774 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49776 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 151.101.1.91:443 -> 192.168.2.4:49777 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49779 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49781 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49780 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49782 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 142.251.116.113:443 -> 192.168.2.4:54326 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:54355 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:54359 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:54356 version: TLS 1.2
        Source: Binary string: webauthn.pdb source: firefox.exe, 0000000D.00000003.1780562540.00000197AFD1E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.13.dr
        Source: Binary string: netprofm.pdb source: firefox.exe, 0000000D.00000003.1799498046.00000197AFD3F000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.13.dr
        Source: Binary string: webauthn.pdbGCTL source: firefox.exe, 0000000D.00000003.1780562540.00000197AFD1E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: netprofm.pdbUGP source: firefox.exe, 0000000D.00000003.1799498046.00000197AFD3F000.00000004.00000020.00020000.00000000.sdmp
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F3DBBE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F468EE FindFirstFileW,FindClose,0_2_00F468EE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00F4698F
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F3D076
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F3D3A9
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F49642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F49642
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F4979D
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F49B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00F49B2B
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F45C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00F45C97
        Source: firefox.exeMemory has grown: Private usage: 38MB later: 224MB
        Source: unknownNetwork traffic detected: DNS query count 31
        Source: Joe Sandbox ViewIP Address: 151.101.1.91 151.101.1.91
        Source: Joe Sandbox ViewIP Address: 34.149.100.209 34.149.100.209
        Source: Joe Sandbox ViewIP Address: 34.117.188.166 34.117.188.166
        Source: Joe Sandbox ViewJA3 fingerprint: fb0aa01abe9d8e4037eb3473ca6e2dca
        Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49762
        Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:54328
        Source: unknownTCP traffic detected without corresponding DNS query: 142.251.116.113
        Source: unknownTCP traffic detected without corresponding DNS query: 142.251.116.113
        Source: unknownTCP traffic detected without corresponding DNS query: 142.251.116.113
        Source: unknownTCP traffic detected without corresponding DNS query: 142.251.116.113
        Source: unknownTCP traffic detected without corresponding DNS query: 142.251.116.113
        Source: unknownTCP traffic detected without corresponding DNS query: 142.251.116.113
        Source: unknownTCP traffic detected without corresponding DNS query: 142.251.116.113
        Source: unknownTCP traffic detected without corresponding DNS query: 142.251.116.113
        Source: unknownTCP traffic detected without corresponding DNS query: 142.251.116.113
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4CE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00F4CE44
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
        Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
        Source: firefox.exe, 0000000D.00000003.1892824636.00000197B12E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.facebook.com/* equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000D.00000003.1873859736.00000197B96D3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869208234.00000197B96CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845020843.00000197B96CC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.youtube.com/* equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1853820176.00000197B9689000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1752060268.00000197B1680000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.facebook.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1853820176.00000197B9689000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1752060268.00000197B1680000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.youtube.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000D.00000003.1892824636.00000197B12E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892984020.00000197B0CDE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892984020.00000197B0CF4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.facebook.com equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000D.00000003.1865874069.00000197BC82E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1828363079.00000197BC82E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.youtube.com equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `https://www.facebook.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: `https://www.youtube.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1853820176.00000197B9689000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1752060268.00000197B1680000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1853820176.00000197B9689000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1752060268.00000197B1680000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9C42000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.000002101650A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2909769914.0000023681C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9C42000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.000002101650A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2909769914.0000023681C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.twitter.com (Twitter)
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9C42000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.000002101650A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2909769914.0000023681C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000D.00000003.1865874069.00000197BC826000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1828363079.00000197BC826000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: moz-extension://a581a2f1-688c-434b-8db8-16166b1993d9/injections/js/bug1842437-www.youtube.com-performance-now-precision.js equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000D.00000003.1752467259.00000197B15F9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892824636.00000197B12E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892984020.00000197B0CDE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
        Source: firefox.exe, 0000000D.00000003.1865874069.00000197BC82E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1752467259.00000197B15F9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1877515031.00000197B15F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com equals www.youtube.com (Youtube)
        Source: firefox.exe, 0000000D.00000003.1892984020.00000197B0CCB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892984020.00000197B0C9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: x*://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
        Source: global trafficDNS traffic detected: DNS query: prod.classify-client.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: youtube.com
        Source: global trafficDNS traffic detected: DNS query: detectportal.firefox.com
        Source: global trafficDNS traffic detected: DNS query: prod.detectportal.prod.cloudops.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: contile.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: spocs.getpocket.com
        Source: global trafficDNS traffic detected: DNS query: prod.ads.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: prod.balrog.prod.cloudops.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: example.org
        Source: global trafficDNS traffic detected: DNS query: ipv4only.arpa
        Source: global trafficDNS traffic detected: DNS query: content-signature-2.cdn.mozilla.net
        Source: global trafficDNS traffic detected: DNS query: prod.content-signature-chains.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: shavar.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: push.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: firefox.settings.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: prod.remote-settings.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: support.mozilla.org
        Source: global trafficDNS traffic detected: DNS query: us-west1.prod.sumo.prod.webservices.mozgcp.net
        Source: global trafficDNS traffic detected: DNS query: telemetry-incoming.r53-2.services.mozilla.com
        Source: global trafficDNS traffic detected: DNS query: www.youtube.com
        Source: global trafficDNS traffic detected: DNS query: www.facebook.com
        Source: global trafficDNS traffic detected: DNS query: www.wikipedia.org
        Source: global trafficDNS traffic detected: DNS query: star-mini.c10r.facebook.com
        Source: global trafficDNS traffic detected: DNS query: youtube-ui.l.google.com
        Source: global trafficDNS traffic detected: DNS query: dyna.wikimedia.org
        Source: global trafficDNS traffic detected: DNS query: www.reddit.com
        Source: global trafficDNS traffic detected: DNS query: twitter.com
        Source: global trafficDNS traffic detected: DNS query: reddit.map.fastly.net
        Source: global trafficDNS traffic detected: DNS query: services.addons.mozilla.org
        Source: global trafficDNS traffic detected: DNS query: normandy.cdn.mozilla.net
        Source: global trafficDNS traffic detected: DNS query: normandy-cdn.services.mozilla.com
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://127.0.0.1:
        Source: firefox.exe, 0000000D.00000003.1752687892.00000197B1592000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1881190531.00000197B1592000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearch/1.0/
        Source: firefox.exe, 0000000D.00000003.1752687892.00000197B1592000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1881190531.00000197B1592000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearch/1.1/
        Source: firefox.exe, 0000000D.00000003.1752687892.00000197B1592000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1881190531.00000197B1592000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.0/
        Source: firefox.exe, 0000000D.00000003.1752687892.00000197B1592000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1881190531.00000197B1592000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.1/
        Source: firefox.exe, 0000000D.00000003.1796021267.00000197AFD0C000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
        Source: firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD02000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
        Source: firefox.exe, 0000000D.00000003.1796021267.00000197AFD0C000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
        Source: firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD02000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
        Source: firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
        Source: firefox.exe, 0000000D.00000003.1902877803.00000197AC37D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://compose.mail.yahoo.co.jp/ym/Compose?To=%s
        Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
        Source: firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD02000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
        Source: firefox.exe, 0000000D.00000003.1796021267.00000197AFD0C000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
        Source: firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD02000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
        Source: firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
        Source: firefox.exe, 0000000D.00000003.1796021267.00000197AFD0C000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
        Source: firefox.exe, 0000000D.00000003.1796021267.00000197AFD0C000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
        Source: firefox.exe, 0000000D.00000003.1796021267.00000197AFD0C000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
        Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
        Source: firefox.exe, 0000000D.00000003.1860648925.00000197B38D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com
        Source: firefox.exe, 0000000D.00000003.1873248302.00000197B299F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/
        Source: firefox.exe, 0000000D.00000003.1872616439.00000197B2D54000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/canonical.html
        Source: firefox.exe, 0000000D.00000003.1874790952.00000197B885D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv4
        Source: firefox.exe, 0000000D.00000003.1858195242.00000197B8864000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv6
        Source: firefox.exe, 0000000D.00000003.1880365938.00000197B851B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858978870.00000197B851B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://developer.mozilla.org/en/docs/DOM:element.addEventListener
        Source: firefox.exe, 0000000D.00000003.1880365938.00000197B851B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858978870.00000197B851B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://developer.mozilla.org/en/docs/DOM:element.removeEventListener
        Source: firefox.exe, 0000000D.00000003.1753220549.00000197B1539000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892587006.00000197B1534000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/
        Source: firefox.exe, 0000000D.00000003.1872616439.00000197B2DB2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875405020.00000197B37E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798459647.00000197B05D9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864839649.00000197B28E7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767291792.00000197B1BBD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1789431887.00000197B17DE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767291792.00000197B1B83000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1705942193.00000197B014F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855093710.00000197B05E1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845020843.00000197B9664000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864063479.00000197B2DB2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1796807540.00000197B1BBE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791895714.00000197B1B83000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892231444.00000197B8334000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792646499.00000197B17D6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1716006685.00000197B13F3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1716529367.00000197B05DD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1756919838.00000197B1896000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1913519359.00000197B13EF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1824707891.00000197B17D6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862671811.00000197B37E6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/MPL/2.0/.
        Source: firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
        Source: firefox.exe, 0000000D.00000003.1796021267.00000197AFD0C000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD02000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0C
        Source: firefox.exe, 0000000D.00000003.1796021267.00000197AFD0C000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0N
        Source: firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD02000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
        Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.thawte.com0
        Source: firefox.exe, 0000000D.00000003.1902877803.00000197AC37D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://poczta.interia.pl/mh/?mailto=%s
        Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
        Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
        Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
        Source: firefox.exe, 0000000D.00000003.1902877803.00000197AC37D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://win.mail.ru/cgi-bin/sentmsg?mailto=%s
        Source: firefox.exe, 0000000D.00000003.1796021267.00000197AFD0C000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
        Source: firefox.exe, 0000000D.00000003.1902877803.00000197AC37D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.inbox.lv/rfc2368/?value=%s
        Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://www.mozilla.com0
        Source: firefox.exe, 0000000D.00000003.1749771482.00000197BA948000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2005/app-updatex
        Source: firefox.exe, 0000000D.00000003.1752687892.00000197B1592000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1881190531.00000197B1592000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2006/browser/search/
        Source: firefox.exe, 0000000D.00000003.1892309398.00000197B285F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865234307.00000197B288E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1854358383.00000197B8FD2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846104196.00000197B8FD2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1853610015.00000197BBA57000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1873319751.00000197B285F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul
        Source: firefox.exe, 0000000D.00000003.1865234307.00000197B288E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul8
        Source: firefox.exe, 0000000D.00000003.1892309398.00000197B285F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1873319751.00000197B285F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xulER
        Source: firefox.exe, 00000010.00000002.2913999483.00000210170FD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000003.1741595143.00000210170FD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000003.1742324520.00000210170FD000.00000004.00000020.00020000.00000000.sdmp, mozilla-temp-41.13.drString found in binary or memory: http://www.videolan.org/x264.html
        Source: firefox.exe, 0000000D.00000003.1752687892.00000197B1553000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://youtube.com/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.malware-error.mozilla.com/?url=
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-error.mozilla.com/?url=
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-report.mozilla.com/?url=
        Source: firefox.exe, 0000000D.00000003.1752687892.00000197B15A3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://MD8.mozilla.org/1/m
        Source: firefox.exe, 0000000D.00000003.1703392153.00000197AFF00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703528651.00000197B011F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703644300.00000197B013C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703880593.00000197B0177000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703755105.00000197B015A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.duckduckgo.com/ac/
        Source: firefox.exe, 0000000D.00000003.1862671811.00000197B37B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.bellmedia.c
        Source: firefox.exe, 0000000D.00000003.1841954799.00000197BC28E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com
        Source: firefox.exe, 0000000D.00000003.1858978870.00000197B8532000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/settings/clients
        Source: firefox.exe, 0000000D.00000003.1855667708.00000197B9CD4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1749962500.00000197B9CD4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1844859513.00000197B9CD4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.comK
        Source: file.exe, 00000000.00000003.1721960630.00000000015CF000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1722006831.00000000015D6000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1723261319.00000000015D7000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1806379294.00000197B87D9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1824419049.00000197B1C4E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1763391809.00000197B1C51000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1823651568.00000197B1C4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1749771482.00000197BA948000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1765297403.00000197B1C50000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766113635.00000197B1C50000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1770437404.00000197B1C4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1793322808.00000197B1C4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1803324773.00000197B1C4B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1766593138.00000197B1C50000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
        Source: firefox.exe, 0000000D.00000003.1844412980.00000197BBAE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/language-tools/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search-engines/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/themes
        Source: firefox.exe, 0000000D.00000003.1892628806.00000197B1529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads-us.rd.linksynergy.com/as.php
        Source: firefox.exe, 0000000D.00000003.1892984020.00000197B0CCB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892984020.00000197B0C9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads.stickyadstv.com/firefox-etp
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://allegro.pl/
        Source: firefox.exe, 0000000D.00000003.1750252391.00000197B89A2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://amazon.com/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://api.accounts.firefox.com/v1
        Source: firefox.exe, 0000000D.00000003.1841954799.00000197BC217000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
        Source: firefox.exe, 0000000D.00000003.1841954799.00000197BC217000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://app.adjust.com/a8bxj8j?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/app/firefox-private-safe-browser/id989804926
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/us/app/firefox-private-network-vpn/id1489407738
        Source: firefox.exe, 0000000D.00000003.1831405024.00000197BC034000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org
        Source: firefox.exe, 0000000D.00000003.1864561152.00000197B29F9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/GMP/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VER
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/SystemAddons/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL
        Source: firefox.exe, 0000000D.00000003.1843810373.00000197BC058000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830931247.00000197BC058000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/6/Firefox/118.0.1/20230927232528/WINNT_x86_64-msvc-x64/en-US/release
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/%blockID%.html
        Source: firefox.exe, 0000000F.00000002.2910506418.000001873B9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.00000210165E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2913450862.0000023681F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
        Source: firefox.exe, 0000000F.00000002.2910506418.000001873B9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.00000210165E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2913450862.0000023681F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
        Source: firefox.exe, 0000000D.00000003.1853610015.00000197BBA57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mo
        Source: firefox.exe, 0000000D.00000003.1773753098.00000197B136D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1773708208.00000197B135A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1189266
        Source: firefox.exe, 0000000D.00000003.1773753098.00000197B136D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1773708208.00000197B135A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
        Source: firefox.exe, 0000000D.00000003.1773708208.00000197B135A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1207993
        Source: firefox.exe, 0000000D.00000003.1773708208.00000197B135A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
        Source: firefox.exe, 0000000D.00000003.1773753098.00000197B136D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1773708208.00000197B135A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
        Source: firefox.exe, 0000000D.00000003.1773753098.00000197B136D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1773708208.00000197B135A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
        Source: firefox.exe, 0000000D.00000003.1773708208.00000197B135A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=792480
        Source: firefox.exe, 0000000D.00000003.1773708208.00000197B135A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=809550
        Source: firefox.exe, 0000000D.00000003.1773708208.00000197B135A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=840161
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
        Source: firefox.exe, 0000000D.00000003.1703392153.00000197AFF00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703528651.00000197B011F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703644300.00000197B013C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703880593.00000197B0177000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703755105.00000197B015A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://completion.amazon.com/search/complete?q=
        Source: firefox.exe, 0000000D.00000003.1752060268.00000197B1668000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1877220232.00000197B1668000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8893000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net/
        Source: firefox.exe, 0000000D.00000003.1857523061.00000197B893E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-202
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://content.cdn.mozilla.net
        Source: firefox.exe, 0000000F.00000002.2910506418.000001873B9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.00000210165E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2913450862.0000023681F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
        Source: firefox.exe, 0000000F.00000002.2910506418.000001873B9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.00000210165E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2913450862.0000023681F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
        Source: firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com
        Source: firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/
        Source: firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/v1/tiles
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://coverage.mozilla.org
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://crash-stats.mozilla.org/report/index/
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crbug.com/993268
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://dap-02.api.divviup.org
        Source: firefox.exe, 0000000D.00000003.1892628806.00000197B1529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datastudio.google.com/embed/reporting/
        Source: firefox.exe, 0000000D.00000003.1858978870.00000197B8522000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1880365938.00000197B8522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
        Source: firefox.exe, 0000000D.00000003.1880365938.00000197B851B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858978870.00000197B851B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1880365938.00000197B8532000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858978870.00000197B8532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
        Source: firefox.exe, 0000000D.00000003.1880365938.00000197B851B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858978870.00000197B851B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/setPointerCaptureElementReleaseCaptureWarning
        Source: firefox.exe, 0000000D.00000003.1858978870.00000197B8522000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1880365938.00000197B8522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#EncryptionPreventDefaultFromP
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/API/ElementCSSInlineStyle/style#setting_styles)
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Statements/for-await...of
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://developers.google.com/safe-browsing/v4/advisory
        Source: firefox.exe, 0000000D.00000003.1752060268.00000197B1680000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1826038663.00000197B18EE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1752687892.00000197B1553000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703392153.00000197AFF00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703528651.00000197B011F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703644300.00000197B013C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1844859513.00000197B9CD4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703880593.00000197B0177000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703755105.00000197B015A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1808115899.00000197B18DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/
        Source: firefox.exe, 0000000D.00000003.1817475557.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902877803.00000197AC37D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1705489466.00000197AF933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905992583.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712714272.00000197AF933000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%s
        Source: firefox.exe, 0000000D.00000003.1817475557.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1705489466.00000197AF933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905992583.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712714272.00000197AF933000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://email.seznam.cz/newMessageScreen?mailto=%s
        Source: firefox.exe, 0000000D.00000003.1880365938.00000197B8532000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858978870.00000197B8532000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://extensionworkshop.com/documentation/publish/self-distribution/
        Source: firefox.exe, 00000010.00000002.2910693510.0000021016512000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2909769914.0000023681C13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-api-proxy.cdn.mozilla.net/
        Source: firefox.exe, 0000000D.00000003.1748033226.00000197B87EA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/673d2808-e5d8-41b9-957
        Source: firefox.exe, 0000000D.00000003.1748033226.00000197B87EA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1746956389.00000197B092B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1748342679.00000197B3B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/706c7a85-cf23-442e-8a9
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://firefox-source-docs.mozilla.org/networking/dns/trr-skip-reasons.html#
        Source: firefox.exe, 0000000D.00000003.1879791210.00000197BC02A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1831405024.00000197BC02A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com
        Source: firefox.exe, 0000000D.00000003.1880704773.00000197B16CA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/
        Source: firefox.exe, 0000000D.00000003.1853610015.00000197BBA57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
        Source: firefox.exe, 0000000D.00000003.1844412980.00000197BBAE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fpn.firefox.com/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://fpn.firefox.com/browser?utm_source=firefox-desktop&utm_medium=referral&utm_campaign=about-pr
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ftp.mozilla.org/pub/labs/devtools/adb-extension/#OS#/adb-extension-latest-#OS#.xpi
        Source: firefox.exe, 00000010.00000002.2910693510.0000021016512000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2909769914.0000023681C13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/
        Source: firefox.exe, 00000011.00000002.2909769914.0000023681CC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
        Source: firefox.exe, 00000011.00000002.2909769914.0000023681CC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
        Source: firefox.exe, 00000011.00000002.2909769914.0000023681C30000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=bas
        Source: firefox.exe, 0000000D.00000003.1852674740.00000197BC1D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtab
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858522117.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875153343.00000197B858D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtabL
        Source: firefox.exe, 0000000D.00000003.1852674740.00000197BC1D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtab
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858522117.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875153343.00000197B858D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtabC
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858522117.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875153343.00000197B858D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/food?utm_source=pocket-newtabA
        Source: firefox.exe, 0000000D.00000003.1852674740.00000197BC1D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtab
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858522117.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875153343.00000197B858D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtabE
        Source: firefox.exe, 0000000D.00000003.1852674740.00000197BC1D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtab
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858522117.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875153343.00000197B858D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtabG
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858522117.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875153343.00000197B858D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/self-improvement?utm_source=pocket-newtab?
        Source: firefox.exe, 0000000D.00000003.1852674740.00000197BC1D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtab
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858522117.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875153343.00000197B858D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtabN
        Source: firefox.exe, 00000011.00000002.2909769914.0000023681CC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tab
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9C8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891907713.00000197B9C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tabL
        Source: firefox.exe, 0000000D.00000003.1852674740.00000197BC1D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtab
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858522117.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875153343.00000197B858D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtabI
        Source: firefox.exe, 0000000D.00000003.1859735549.00000197B8362000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858522117.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875153343.00000197B858D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more/
        Source: firefox.exe, 00000011.00000002.2909769914.0000023681CC4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendations
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9C8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891907713.00000197B9C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9C8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891907713.00000197B9C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS7
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9C8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891907713.00000197B9C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=basic
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/google/closure-compiler/issues/3177
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8423000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query.ts
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/issues/1266
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/microsoft/TypeScript/issues/338).
        Source: firefox.exe, 0000000D.00000003.1703392153.00000197AFF00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703528651.00000197B011F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703644300.00000197B013C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703880593.00000197B0177000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703755105.00000197B015A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mozilla-services/screenshots
        Source: firefox.exe, 0000000D.00000003.1861896954.00000197BC058000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843810373.00000197BC058000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830931247.00000197BC058000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/uuidjs/uuid#getrandomvalues-not-supported
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9C8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891907713.00000197B9C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/zertosh/loose-envify)
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://helper1.dap.cloudflareresearch.com/v02
        Source: firefox.exe, 0000000D.00000003.1773526833.00000197B1BD2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1846609982.00000197B8EF8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ib.absa.co.za/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ideas.mozilla.org/
        Source: firefox.exe, 0000000D.00000003.1841954799.00000197BC28E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/oldsyncS
        Source: firefox.exe, 0000000D.00000003.1880126318.00000197B9612000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845787217.00000197B9611000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/relay
        Source: firefox.exe, 0000000D.00000003.1841954799.00000197BC28E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/H
        Source: firefox.exe, 0000000D.00000003.1841954799.00000197BC28E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/HCX
        Source: firefox.exe, 0000000D.00000003.1841954799.00000197BC28E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryU
        Source: firefox.exe, 0000000D.00000003.1841954799.00000197BC28E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryUFj
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858522117.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://img-getpocket.cdn.mozilla.net/X
        Source: prefs-1.js.13.drString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
        Source: firefox.exe, 0000000D.00000003.1844412980.00000197BBAE3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org
        Source: firefox.exe, 00000011.00000002.2909769914.0000023681CF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit
        Source: firefox.exe, 0000000D.00000003.1892514689.00000197B154A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/00965058-f226-4a35
        Source: firefox.exe, 0000000D.00000003.1892514689.00000197B154A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/0bc25998-a431-42a9
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9C8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891907713.00000197B9C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submits
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://infra.spec.whatwg.org/#ascii-whitespace
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://install.mozilla.org
        Source: firefox.exe, 0000000D.00000003.1880173806.00000197B89B5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1856753387.00000197B89B0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1750252391.00000197B89B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/libraries/standalone-templates/#rendering-lit-html-templates
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/directives/#stylemap
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/expressions/#child-expressions)
        Source: firefox.exe, 0000000D.00000003.1752687892.00000197B15B3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=%MOZILLA_API_KEY%
        Source: firefox.exe, 0000000D.00000003.1881431457.00000197B1575000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=7e40f68c-7938-4c5d-9f95-e61647c213eb
        Source: firefox.exe, 0000000D.00000003.1862671811.00000197B37B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
        Source: firefox.exe, 0000000D.00000003.1863424733.00000197B3741000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862671811.00000197B37B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com
        Source: firefox.exe, 0000000D.00000003.1892109095.00000197B96A8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869208234.00000197B96A8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845020843.00000197B96A8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1874107711.00000197B96A8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1853820176.00000197B96A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lookerstudio.google.com/embed/reporting/
        Source: firefox.exe, 0000000D.00000003.1817475557.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1705489466.00000197AF933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905992583.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712714272.00000197AF933000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?extsrc=mailto&url=%s
        Source: firefox.exe, 0000000D.00000003.1817475557.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902877803.00000197AC37D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1705489466.00000197AF933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905992583.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712714272.00000197AF933000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.inbox.lv/compose?to=%s
        Source: firefox.exe, 0000000D.00000003.1817475557.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902877803.00000197AC37D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1705489466.00000197AF933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905992583.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712714272.00000197AF933000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.yahoo.co.jp/compose/?To=%s
        Source: firefox.exe, 00000010.00000002.2910693510.0000021016586000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2909769914.0000023681C8F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://merino.services.mozilla.com/api/v1/suggest
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mitmdetection.services.mozilla.com/
        Source: firefox.exe, 0000000D.00000003.1844412980.00000197BBAE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/about
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/breach-details/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/breach-stats?includeResolved=true
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/dashboard
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/preferences
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla-ohttp-fakespot.fastly-edge.com/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla.cloudflare-dns.com/dns-query
        Source: firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mozilla.org0/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://normandy.cdn.mozilla.net/api/v1
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://oauth.accounts.firefox.com/v1
        Source: firefox.exe, 0000000D.00000003.1817475557.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1705489466.00000197AF933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905992583.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712714272.00000197AF933000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://outlook.live.com/default.aspx?rru=compose&to=%s
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
        Source: firefox.exe, 0000000D.00000003.1817475557.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902877803.00000197AC37D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1705489466.00000197AF933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905992583.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712714272.00000197AF933000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://poczta.interia.pl/mh/?mailto=%s
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://prod.ohttp-gateway.prod.webservices.mozgcp.net/ohttp-configs
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profile.accounts.firefox.com/v1
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profiler.firefox.com
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8893000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.services.mozilla.com/
        Source: firefox.exe, 0000000D.00000003.1891907713.00000197B9C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://redux.js.org/api-reference/store#subscribe(listener)
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/accounts/profile/?utm_medium=firefox-desktop&utm_source=modal&utm_campaign
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/api/v1/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/diagnostic?site=
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&p
        Source: firefox.exe, 0000000D.00000003.1873632549.00000197BA926000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=118.0&pver=2.2
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBR
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSIN
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGL
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%
        Source: firefox.exe, 0000000D.00000003.1703755105.00000197B015A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://screenshots.firefox.com/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/abuse/report/addon/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/language-tools/?app=firefox&type=language&appversi
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/discovery/?lang=%LOCALE%&edition=%DISTRIBUTION%
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
        Source: firefox.exe, 0000000D.00000003.1876804430.00000197B25B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com
        Source: firefox.exe, 0000000D.00000003.1856425879.00000197B8E41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9C5D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=navclient-auto-ffox&appver=118.0&pver=2.2
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
        Source: firefox.exe, 0000000D.00000003.1745791182.00000197B1683000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1752060268.00000197B1680000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1877141584.00000197B1680000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://smartblock.firefox.etp/facebook.svg
        Source: firefox.exe, 0000000D.00000003.1745791182.00000197B1683000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1752060268.00000197B1680000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1877141584.00000197B1680000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://smartblock.firefox.etp/play.svg
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://snippets.cdn.mozilla.net/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%L
        Source: firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com
        Source: firefox.exe, 00000010.00000002.2910693510.0000021016512000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2909769914.0000023681C13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/
        Source: firefox.exe, 0000000D.00000003.1877141584.00000197B1680000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1852674740.00000197BC1D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858522117.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875153343.00000197B858D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858522117.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875153343.00000197B858D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#l
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9C5D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855747539.00000197B9C8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891907713.00000197B9C8D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.00000210165C2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2909769914.0000023681CF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/user
        Source: firefox.exe, 0000000D.00000003.1892984020.00000197B0CCB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892984020.00000197B0C9B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-pixel
        Source: firefox.exe, 0000000D.00000003.1844412980.00000197BBAE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cryptominers-report
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/search-engine-removal
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
        Source: firefox.exe, 0000000D.00000003.1830147569.00000197BC2B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1841492181.00000197BC2B8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892628806.00000197B1529000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/
        Source: firefox.exe, 0000000D.00000003.1854294881.00000197B9606000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/firefox-relay-integration
        Source: firefox.exe, 0000000D.00000003.1840289160.00000197BC8CC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/captive-portal
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9CB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
        Source: firefox.exe, 0000000D.00000003.1880365938.00000197B851B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858978870.00000197B851B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsMediaPlatformDecoderNotFound
        Source: firefox.exe, 0000000D.00000003.1880365938.00000197B851B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858978870.00000197B851B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/fix-video-audio-problems-firefox-windowsMediaWMFNeeded
        Source: firefox.exe, 0000000D.00000003.1803058146.00000197B3980000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings
        Source: firefox.exe, 0000000D.00000003.1872509804.00000197B388E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860648925.00000197B3883000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9CB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tc39.github.io/ecma262/#sec-typeof-operator
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://token.services.mozilla.com/1.0/sync/1.5
        Source: firefox.exe, 0000000D.00000003.1880365938.00000197B8522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
        Source: firefox.exe, 0000000D.00000003.1880365938.00000197B8522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-3.1
        Source: firefox.exe, 0000000D.00000003.1880365938.00000197B8522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
        Source: firefox.exe, 0000000D.00000003.1880365938.00000197B8522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/rfc7515#appendix-C)
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://topsites.services.mozilla.com/cid/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://tracking-protection-issues.herokuapp.com/new
        Source: firefox.exe, 0000000D.00000003.1844412980.00000197BBAE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://truecolors.firefox.com/
        Source: firefox.exe, 0000000D.00000003.1845020843.00000197B9689000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-%CHANNEL%-browser&utm_campaig
        Source: firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign=about-pr
        Source: firefox.exe, 0000000D.00000003.1873632549.00000197BA92C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://watch.sling.com/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webcompat.com/issues/new
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webextensions.settings.services.mozilla.com/v1
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9C8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1891907713.00000197B9C8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://webpack.js.org/concepts/mode/)
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1859302934.00000197B83DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://weibo.com/
        Source: firefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wicg.github.io/construct-stylesheets/#using-constructed-stylesheets).
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.aliexpress.com/
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.ca/
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.co.uk/
        Source: firefox.exe, 0000000D.00000003.1845020843.00000197B9689000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/
        Source: firefox.exe, 0000000F.00000002.2910506418.000001873B9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.00000210165E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2913450862.0000023681F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
        Source: firefox.exe, 0000000D.00000003.1751186963.00000197B85FD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703880593.00000197B0177000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703755105.00000197B015A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1808115899.00000197B18DE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858195242.00000197B8864000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/exec/obidos/external-search/
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.de/
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.fr/
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.avito.ru/
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.baidu.com/
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.bbc.co.uk/
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ctrip.com/
        Source: firefox.exe, 0000000D.00000003.1796021267.00000197AFD0C000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1781010957.00000197AFCFF000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780786897.00000197AFD0D000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1780940076.00000197AFD19000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: https://www.digicert.com/CPS0
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ebay.co.uk/
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ebay.de/
        Source: firefox.exe, 0000000F.00000002.2910506418.000001873B9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.00000210165E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2913450862.0000023681F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
        Source: firefox.exe, 0000000D.00000003.1750252391.00000197B898A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B853C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
        Source: firefox.exe, 0000000D.00000003.1892309398.00000197B283B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1873319751.00000197B283B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/
        Source: firefox.exe, 0000000D.00000003.1742297066.00000197B863E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search
        Source: firefox.exe, 0000000D.00000003.1750252391.00000197B8996000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703880593.00000197B0177000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703755105.00000197B015A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search?client=firefox&q=
        Source: firefox.exe, 0000000D.00000003.1827561238.00000197B18F1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1757229439.00000197B18FE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1826038663.00000197B18EE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1752687892.00000197B1553000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703392153.00000197AFF00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703528651.00000197B011F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703644300.00000197B013C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703880593.00000197B0177000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703755105.00000197B015A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1808115899.00000197B18DE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search
        Source: firefox.exe, 0000000D.00000003.1853610015.00000197BBA57000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search?client=firefox-b-d&q=
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_LOCATION_SERVICE_API_KEY%
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ifeng.com/
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.iqiyi.com/
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.leboncoin.fr/
        Source: firefox.exe, 0000000D.00000003.1874363762.00000197B8969000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1874363762.00000197B896B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1750252391.00000197B896B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1752467259.00000197B15F5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1856902138.00000197B896B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org
        Source: firefox.exe, 0000000D.00000003.1844412980.00000197BBAE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/about/legal/terms/subscription-services/
        Source: firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/releasenotes/?utm_source=firefox-browser&utm_medi
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/tour/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/geolocation/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/new?reason=manual-update
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/notes
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/set-as-default/thanks/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/xr/
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/privacy/subscription-services/
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9CB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
        Source: firefox.exe, 0000000D.00000003.1748033226.00000197B87EA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1746956389.00000197B092B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1748342679.00000197B3B98000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/legal/terms/mozilla/
        Source: firefox.exe, 0000000D.00000003.1841954799.00000197BC217000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/anything/?
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9CB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
        Source: firefox.exe, 0000000D.00000003.1854294881.00000197B9606000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/about/legal/terms/subscription-services/
        Source: firefox.exe, 0000000D.00000003.1831782360.00000197BC010000.00000004.00000800.00020000.00000000.sdmp, targeting.snapshot.json.tmp.13.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
        Source: firefox.exe, 0000000D.00000003.1752467259.00000197B15DC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1877515031.00000197B15DC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1852498754.00000197BC2F3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855747539.00000197B9CB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
        Source: firefox.exe, 0000000D.00000003.1854294881.00000197B9606000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/subscription-services/
        Source: firefox.exe, 0000000D.00000003.1855747539.00000197B9CB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/android/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/ios/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campa
        Source: firefox.exe, 0000000D.00000003.1841954799.00000197BC217000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/mobile/get-app/?utm_medium=firefox-desktop&utm_source=onboarding-mod
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#crash-reporter
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#health-report
        Source: firefox.exe, 0000000F.00000002.2910506418.000001873B9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.00000210165C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2909769914.0000023681CF6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
        Source: firefox.exe, 0000000D.00000003.1852674740.00000197BC1D8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-content
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858522117.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875153343.00000197B858D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-contentP
        Source: firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
        Source: firefox.exe, 0000000D.00000003.1744576377.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858522117.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875153343.00000197B858D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/V
        Source: firefox.exe, 0000000D.00000003.1852498754.00000197BC2F3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855747539.00000197B9CB9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
        Source: firefox.exe, 0000000D.00000003.1862671811.00000197B37B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1859302934.00000197B83DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.olx.pl/
        Source: firefox.exe, 0000000D.00000003.1845020843.00000197B9689000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.reddit.com/
        Source: firefox.exe, 0000000D.00000003.1873632549.00000197BA92C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sling.com/
        Source: firefox.exe, 0000000D.00000003.1879791210.00000197BC010000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1868960482.00000197BC010000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1831782360.00000197BC00D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1831782360.00000197BC010000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/
        Source: firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.wykop.pl/
        Source: firefox.exe, 0000000D.00000003.1845020843.00000197B9689000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.000002101650A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2909769914.0000023681C0C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
        Source: firefox.exe, 0000000D.00000003.1859302934.00000197B83DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.zhihu.com/
        Source: firefox.exe, 0000000D.00000003.1858978870.00000197B8522000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1880365938.00000197B8522000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://xhr.spec.whatwg.org/#sync-warning
        Source: firefox.exe, 0000000D.00000003.1892514689.00000197B1553000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com
        Source: firefox.exe, 0000000D.00000003.1862671811.00000197B37B2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/
        Source: recovery.jsonlz4.tmp.13.drString found in binary or memory: https://youtube.com/account?=
        Source: file.exe, 00000000.00000003.1721932362.00000000015EE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1724360728.00000000015F4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1722046144.00000000015F3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=htt==
        Source: firefox.exe, 00000011.00000002.2913036399.0000023681DD0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/sig
        Source: firefox.exe, 0000000D.00000003.1892514689.00000197B1553000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1793322808.00000197B1C1F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1770437404.00000197B1C67000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2909349732.000001873B620000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2912989422.000001873BA14000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2909349732.000001873B62A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910154145.0000021016494000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2908256744.000002101618A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2913036399.0000023681DD4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2908126870.000002368191A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2908126870.0000023681910000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
        Source: firefox.exe, 0000000B.00000002.1692798872.0000018B510B0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000C.00000002.1699048128.00000269688F1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd--no-default-browser
        Source: firefox.exe, 00000010.00000002.2908256744.0000021016180000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdK
        Source: firefox.exe, 0000000F.00000002.2909349732.000001873B620000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2912989422.000001873BA14000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2908256744.0000021016180000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910154145.0000021016494000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2913036399.0000023681DD4000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2908126870.0000023681910000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdMOZ_CRASHREPORTER_RE
        Source: firefox.exe, 00000010.00000002.2908256744.000002101618A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd_
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
        Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
        Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 54356 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 54327 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
        Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
        Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
        Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49767 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 54326 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49768
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49767
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54519
        Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49761
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54356
        Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54355
        Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54359
        Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49751 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
        Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
        Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49751
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
        Source: unknownNetwork traffic detected: HTTP traffic on port 49761 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54327
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 54326
        Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49768 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 54355 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 54359 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 54519 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
        Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49743 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49745 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49750 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49759 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49769 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49770 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49774 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49776 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 151.101.1.91:443 -> 192.168.2.4:49777 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49779 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49781 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49780 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49782 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 142.251.116.113:443 -> 192.168.2.4:54326 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:54355 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:54359 version: TLS 1.2
        Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:54356 version: TLS 1.2
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00F4EAFF
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4ED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00F4ED6A
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4EAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00F4EAFF
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3AA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00F3AA57
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F69576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00F69576

        System Summary

        barindex
        Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
        Source: file.exe, 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_d34fb1f2-9
        Source: file.exe, 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_1c35e6b8-d
        Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_4245d013-e
        Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_dd2ed27b-6
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000210164667B7 NtQuerySystemInformation,16_2_00000210164667B7
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000210164A2C72 NtQuerySystemInformation,16_2_00000210164A2C72
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3D5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00F3D5EB
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F31201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00F31201
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3E8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00F3E8F6
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED80600_2_00ED8060
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F420460_2_00F42046
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F382980_2_00F38298
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0E4FF0_2_00F0E4FF
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0676B0_2_00F0676B
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F648730_2_00F64873
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EDCAF00_2_00EDCAF0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EFCAA00_2_00EFCAA0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EECC390_2_00EECC39
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F06DD90_2_00F06DD9
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED91C00_2_00ED91C0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EEB1190_2_00EEB119
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF13940_2_00EF1394
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF17060_2_00EF1706
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF781B0_2_00EF781B
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF19B00_2_00EF19B0
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EE997D0_2_00EE997D
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED79200_2_00ED7920
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF7A4A0_2_00EF7A4A
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF7CA70_2_00EF7CA7
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF1C770_2_00EF1C77
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F09EEE0_2_00F09EEE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F5BE440_2_00F5BE44
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF1F320_2_00EF1F32
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000210164667B716_2_00000210164667B7
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000210164A2C7216_2_00000210164A2C72
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000210164A339C16_2_00000210164A339C
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000210164A2CB216_2_00000210164A2CB2
        Source: C:\Users\user\Desktop\file.exeCode function: String function: 00EEF9F2 appears 31 times
        Source: C:\Users\user\Desktop\file.exeCode function: String function: 00EF0A30 appears 46 times
        Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
        Source: classification engineClassification label: mal72.troj.evad.winEXE@34/34@66/12
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F437B5 GetLastError,FormatMessageW,0_2_00F437B5
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F310BF AdjustTokenPrivileges,CloseHandle,0_2_00F310BF
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F316C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00F316C3
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F451CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00F451CD
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3D4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00F3D4DC
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00F4648E
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED42A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00ED42A2
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Mozilla\Firefox\SkeletonUILock-c388d246Jump to behavior
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7724:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7792:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7604:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7508:120:WilError_03
        Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7660:120:WilError_03
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Temp\firefoxJump to behavior
        Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
        Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: firefox.exe, 0000000D.00000003.1841492181.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830147569.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE timestamp BETWEEN date(:dateFrom) AND date(:dateTo);
        Source: firefox.exe, 0000000D.00000003.1841492181.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830147569.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE events (id INTEGER PRIMARY KEY, type INTEGER NOT NULL, count INTEGER NOT NULL, timestamp DATE );
        Source: firefox.exe, 0000000D.00000003.1841492181.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830147569.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INSERT INTO events (type, count, timestamp) VALUES (:type, 1, date(:date));
        Source: firefox.exe, 0000000D.00000003.1841492181.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830147569.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;
        Source: firefox.exe, 0000000D.00000003.1830931247.00000197BC053000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1843810373.00000197BC053000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;
        Source: firefox.exe, 0000000D.00000003.1841492181.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830147569.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;Fy6
        Source: firefox.exe, 0000000D.00000003.1841492181.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830147569.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: UPDATE events SET count = count + 1 WHERE id = :id;-
        Source: firefox.exe, 0000000D.00000003.1841492181.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830147569.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9'
        Source: firefox.exe, 0000000D.00000003.1841492181.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830147569.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9
        Source: firefox.exe, 0000000D.00000003.1841492181.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830147569.00000197BC2A5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE type = :type AND timestamp = date(:date);
        Source: file.exeReversingLabs: Detection: 47%
        Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
        Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
        Source: unknownProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2248 -prefMapHandle 2240 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {681be74a-1bb9-45bf-a064-2568e5603787} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197a056d310 socket
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3936 -parentBuildID 20230927232528 -prefsHandle 3904 -prefMapHandle 3892 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8548365d-f205-4391-ba44-a87f283ec693} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197b276a710 rdd
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5124 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4732 -prefMapHandle 5108 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1499095d-2804-4cb1-b508-9ad3baa802c6} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197a0574f10 utility
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blockingJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blockingJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2248 -prefMapHandle 2240 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {681be74a-1bb9-45bf-a064-2568e5603787} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197a056d310 socketJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3936 -parentBuildID 20230927232528 -prefsHandle 3904 -prefMapHandle 3892 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8548365d-f205-4391-ba44-a87f283ec693} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197b276a710 rddJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5124 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4732 -prefMapHandle 5108 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1499095d-2804-4cb1-b508-9ad3baa802c6} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197a0574f10 utilityJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
        Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
        Source: Window RecorderWindow detected: More than 3 window changes detected
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
        Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
        Source: Binary string: webauthn.pdb source: firefox.exe, 0000000D.00000003.1780562540.00000197AFD1E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.13.dr
        Source: Binary string: netprofm.pdb source: firefox.exe, 0000000D.00000003.1799498046.00000197AFD3F000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.13.dr
        Source: Binary string: webauthn.pdbGCTL source: firefox.exe, 0000000D.00000003.1780562540.00000197AFD1E000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: netprofm.pdbUGP source: firefox.exe, 0000000D.00000003.1799498046.00000197AFD3F000.00000004.00000020.00020000.00000000.sdmp
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
        Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00ED42DE
        Source: gmpopenh264.dll.tmp.13.drStatic PE information: section name: .rodata
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF0A76 push ecx; ret 0_2_00EF0A89
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpJump to dropped file
        Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)Jump to dropped file
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EEF98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00EEF98E
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F61C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00F61C41
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\file.exeSandbox detection routine: GetForegroundWindow, DecisionNode, Sleepgraph_0-95913
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000210164667B7 rdtsc 16_2_00000210164667B7
        Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.6 %
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3DBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00F3DBBE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F468EE FindFirstFileW,FindClose,0_2_00F468EE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00F4698F
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3D076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F3D076
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3D3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00F3D3A9
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F49642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F49642
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00F4979D
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F49B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00F49B2B
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F45C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00F45C97
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00ED42DE
        Source: firefox.exe, 00000010.00000002.2912884453.0000021016A60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlly
        Source: firefox.exe, 00000010.00000002.2912884453.0000021016A60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll-
        Source: firefox.exe, 00000010.00000002.2912884453.0000021016A60000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll.
        Source: firefox.exe, 0000000F.00000002.2914077897.000001873BC00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
        Source: firefox.exe, 00000010.00000002.2912884453.0000021016A60000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2908256744.000002101618A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2908126870.000002368191A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2913289144.0000023681DE0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
        Source: firefox.exe, 0000000F.00000002.2913334801.000001873BB1F000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW : 2 : 34 : 1 : 1 : 0x20026 : 0x8 : %SystemRoot%\system32\mswsock.dll : : 1234191b-4bf7-4ca7-86e0-dfd7c32b5445
        Source: firefox.exe, 0000000F.00000002.2909349732.000001873B62A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@#
        Source: firefox.exe, 0000000F.00000002.2914077897.000001873BC00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
        Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
        Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000210164667B7 rdtsc 16_2_00000210164667B7
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F4EAA2 BlockInput,0_2_00F4EAA2
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F02622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F02622
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00ED42DE
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF4CE8 mov eax, dword ptr fs:[00000030h]0_2_00EF4CE8
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F30B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00F30B62
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F02622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00F02622
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00EF083F
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF09D5 SetUnhandledExceptionFilter,0_2_00EF09D5
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF0C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00EF0C21
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F31201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00F31201
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F12BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00F12BA5
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F3B226 SendInput,keybd_event,0_2_00F3B226
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F522DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00F522DA
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F30B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00F30B62
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F31663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00F31663
        Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
        Source: file.exeBinary or memory string: Shell_TrayWnd
        Source: firefox.exe, 0000000D.00000003.1793294381.00000197BC901000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: hSoftware\Policies\Microsoft\Windows\PersonalizationNoChangingStartMenuBackgroundPersonalColors_BackgroundWilStaging_02RtlDisownModuleHeapAllocationRtlQueryFeatureConfigurationRtlRegisterFeatureConfigurationChangeNotificationRtlSubscribeWnfStateChangeNotificationRtlDllShutdownInProgressntdll.dllNtQueryWnfStateDataLocal\SM0:%d:%d:%hs_p0Local\SessionImmersiveColorPreferenceBEGINTHMthmfile\Sessions\%d\Windows\ThemeSectionMessageWindowendthemewndThemeApiConnectionRequest\ThemeApiPortwinsta0SOFTWARE\Microsoft\Windows\CurrentVersion\Themes\PersonalizeAppsUseLightThemeSystemUsesLightThemedefaultshell\themes\uxtheme\render.cppCompositedWindow::WindowdeletedrcacheMDIClientSoftware\Microsoft\Windows\DWMColorPrevalenceSoftware\Microsoft\Windows\CurrentVersion\ImmersiveShellTabletModeMENUAccentColorSoftware\Microsoft\Windows\CurrentVersion\Explorer\AccentDefaultStartColorControl Panel\DesktopAutoColorizationAccentColorMenuStartColorMenuAutoColorSoftware\Microsoft\Windows\CurrentVersion\Themes\History\ColorsSoftware\Microsoft\Windows\CurrentVersion\Themes\HistoryAccentPaletteTab$Shell_TrayWndLocal\SessionImmersiveColorMutex
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EF0698 cpuid 0_2_00EF0698
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F48195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00F48195
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F2D27A GetUserNameW,0_2_00F2D27A
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F0BB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00F0BB6F
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED42DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00ED42DE

        Stealing of Sensitive Information

        barindex
        Source: Yara matchFile source: 00000000.00000003.1721960630.00000000015CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000003.1722006831.00000000015D6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: file.exe PID: 7484, type: MEMORYSTR
        Source: file.exeBinary or memory string: WIN_81
        Source: file.exeBinary or memory string: WIN_XP
        Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
        Source: file.exeBinary or memory string: WIN_XPe
        Source: file.exeBinary or memory string: WIN_VISTA
        Source: file.exeBinary or memory string: WIN_7
        Source: file.exeBinary or memory string: WIN_8

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: 00000000.00000003.1721960630.00000000015CF000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: 00000000.00000003.1722006831.00000000015D6000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
        Source: Yara matchFile source: Process Memory Space: file.exe PID: 7484, type: MEMORYSTR
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F51204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00F51204
        Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00F51806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00F51806
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire Infrastructure2
        Valid Accounts
        1
        Windows Management Instrumentation
        1
        DLL Side-Loading
        1
        Exploitation for Privilege Escalation
        2
        Disable or Modify Tools
        21
        Input Capture
        2
        System Time Discovery
        Remote Services1
        Archive Collected Data
        2
        Ingress Tool Transfer
        Exfiltration Over Other Network Medium1
        System Shutdown/Reboot
        CredentialsDomainsDefault Accounts1
        Native API
        2
        Valid Accounts
        1
        DLL Side-Loading
        1
        Deobfuscate/Decode Files or Information
        LSASS Memory1
        Account Discovery
        Remote Desktop Protocol21
        Input Capture
        12
        Encrypted Channel
        Exfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
        Extra Window Memory Injection
        2
        Obfuscated Files or Information
        Security Account Manager2
        File and Directory Discovery
        SMB/Windows Admin Shares3
        Clipboard Data
        2
        Non-Application Layer Protocol
        Automated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
        Valid Accounts
        1
        DLL Side-Loading
        NTDS16
        System Information Discovery
        Distributed Component Object ModelInput Capture3
        Application Layer Protocol
        Traffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
        Access Token Manipulation
        1
        Extra Window Memory Injection
        LSA Secrets131
        Security Software Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
        Process Injection
        1
        Masquerading
        Cached Domain Credentials1
        Virtualization/Sandbox Evasion
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
        Valid Accounts
        DCSync3
        Process Discovery
        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
        Virtualization/Sandbox Evasion
        Proc Filesystem1
        Application Window Discovery
        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
        Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
        Access Token Manipulation
        /etc/passwd and /etc/shadow1
        System Owner/User Discovery
        Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
        IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron2
        Process Injection
        Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet
        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1546574 Sample: file.exe Startdate: 01/11/2024 Architecture: WINDOWS Score: 72 45 youtube.com 2->45 47 youtube-ui.l.google.com 2->47 49 34 other IPs or domains 2->49 57 Multi AV Scanner detection for submitted file 2->57 59 Yara detected Credential Flusher 2->59 61 Binary is likely a compiled AutoIt script file 2->61 63 2 other signatures 2->63 8 file.exe 2->8         started        11 firefox.exe 1 2->11         started        signatures3 process4 signatures5 65 Binary is likely a compiled AutoIt script file 8->65 67 Found API chain indicative of sandbox detection 8->67 13 taskkill.exe 1 8->13         started        15 taskkill.exe 1 8->15         started        17 taskkill.exe 1 8->17         started        23 3 other processes 8->23 19 firefox.exe 3 200 11->19         started        process6 dnsIp7 25 conhost.exe 13->25         started        27 conhost.exe 15->27         started        29 conhost.exe 17->29         started        51 142.251.116.113, 443, 54326 GOOGLEUS United States 19->51 53 prod.detectportal.prod.cloudops.mozgcp.net 34.107.221.82, 49740, 49746, 49749 GOOGLEUS United States 19->53 55 10 other IPs or domains 19->55 41 C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+ 19->41 dropped 43 C:\Users\user\...\gmpopenh264.dll (copy), PE32+ 19->43 dropped 31 firefox.exe 1 19->31         started        33 firefox.exe 1 19->33         started        35 firefox.exe 1 19->35         started        37 conhost.exe 23->37         started        39 conhost.exe 23->39         started        file8 process9

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        file.exe47%ReversingLabsWin32.Trojan.CredentialFlusher
        file.exe100%Joe Sandbox ML
        SourceDetectionScannerLabelLink
        C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)0%ReversingLabs
        C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp0%ReversingLabs
        No Antivirus matches
        SourceDetectionScannerLabelLink
        example.org0%VirustotalBrowse
        star-mini.c10r.facebook.com0%VirustotalBrowse
        prod.classify-client.prod.webservices.mozgcp.net0%VirustotalBrowse
        prod.balrog.prod.cloudops.mozgcp.net0%VirustotalBrowse
        SourceDetectionScannerLabelLink
        https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l0%URL Reputationsafe
        http://detectportal.firefox.com/0%URL Reputationsafe
        https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%0%URL Reputationsafe
        https://datastudio.google.com/embed/reporting/0%URL Reputationsafe
        http://www.mozilla.com00%URL Reputationsafe
        https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.0%URL Reputationsafe
        https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl0%URL Reputationsafe
        https://merino.services.mozilla.com/api/v1/suggest0%URL Reputationsafe
        https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect0%URL Reputationsafe
        https://www.leboncoin.fr/0%URL Reputationsafe
        https://spocs.getpocket.com/spocs0%URL Reputationsafe
        https://shavar.services.mozilla.com0%URL Reputationsafe
        https://completion.amazon.com/search/complete?q=0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report0%URL Reputationsafe
        https://ads.stickyadstv.com/firefox-etp0%URL Reputationsafe
        https://identity.mozilla.com/ids/ecosystem_telemetryU0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab0%URL Reputationsafe
        https://monitor.firefox.com/breach-details/0%URL Reputationsafe
        https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM0%URL Reputationsafe
        https://xhr.spec.whatwg.org/#sync-warning0%URL Reputationsafe
        https://services.addons.mozilla.org/api/v4/addons/addon/0%URL Reputationsafe
        https://tracking-protection-issues.herokuapp.com/new0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report0%URL Reputationsafe
        https://content-signature-2.cdn.mozilla.net/0%URL Reputationsafe
        https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=ht0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report0%URL Reputationsafe
        https://api.accounts.firefox.com/v10%URL Reputationsafe
        https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc0%URL Reputationsafe
        https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections0%URL Reputationsafe
        http://win.mail.ru/cgi-bin/sentmsg?mailto=%s0%URL Reputationsafe
        https://bugzilla.mozilla.org/show_bug.cgi?id=12836010%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield0%URL Reputationsafe
        https://MD8.mozilla.org/1/m0%URL Reputationsafe
        https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=0%URL Reputationsafe
        https://bugzilla.mozilla.org/show_bug.cgi?id=12662200%URL Reputationsafe
        https://bugzilla.mo0%URL Reputationsafe
        https://mitmdetection.services.mozilla.com/0%URL Reputationsafe
        https://shavar.services.mozilla.com/0%URL Reputationsafe
        https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture0%URL Reputationsafe
        https://spocs.getpocket.com/0%URL Reputationsafe
        https://services.addons.mozilla.org/api/v4/abuse/report/addon/0%URL Reputationsafe
        https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%0%URL Reputationsafe
        https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f0%URL Reputationsafe
        https://monitor.firefox.com/user/breach-stats?includeResolved=true0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report0%URL Reputationsafe
        http://a9.com/-/spec/opensearch/1.0/0%URL Reputationsafe
        https://safebrowsing.google.com/safebrowsing/diagnostic?site=0%URL Reputationsafe
        https://monitor.firefox.com/user/dashboard0%URL Reputationsafe
        https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID0%URL Reputationsafe
        https://monitor.firefox.com/about0%URL Reputationsafe
        https://account.bellmedia.c0%URL Reputationsafe
        https://login.microsoftonline.com0%URL Reputationsafe
        https://coverage.mozilla.org0%URL Reputationsafe
        http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
        https://www.zhihu.com/0%URL Reputationsafe
        http://a9.com/-/spec/opensearch/1.1/0%URL Reputationsafe
        https://infra.spec.whatwg.org/#ascii-whitespace0%URL Reputationsafe
        https://blocked.cdn.mozilla.net/0%URL Reputationsafe
        https://json-schema.org/draft/2019-09/schema0%URL Reputationsafe
        http://developer.mozilla.org/en/docs/DOM:element.addEventListener0%URL Reputationsafe
        https://profiler.firefox.com0%URL Reputationsafe
        https://outlook.live.com/default.aspx?rru=compose&to=%s0%URL Reputationsafe
        https://identity.mozilla.com/apps/relay0%URL Reputationsafe
        https://mozilla.cloudflare-dns.com/dns-query0%URL Reputationsafe
        https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings20%URL Reputationsafe
        https://bugzilla.mozilla.org/show_bug.cgi?id=16784480%URL Reputationsafe
        https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg0%URL Reputationsafe
        https://contile.services.mozilla.com/v1/tiles0%URL Reputationsafe
        https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/0%URL Reputationsafe
        https://monitor.firefox.com/user/preferences0%URL Reputationsafe
        https://screenshots.firefox.com/0%URL Reputationsafe
        https://truecolors.firefox.com/0%URL Reputationsafe
        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report0%URL Reputationsafe
        https://www.wykop.pl/0%URL Reputationsafe
        https://www.olx.pl/0%URL Reputationsafe
        NameIPActiveMaliciousAntivirus DetectionReputation
        example.org
        93.184.215.14
        truefalseunknown
        star-mini.c10r.facebook.com
        157.240.253.35
        truefalseunknown
        prod.classify-client.prod.webservices.mozgcp.net
        35.190.72.216
        truefalseunknown
        prod.balrog.prod.cloudops.mozgcp.net
        35.244.181.201
        truefalseunknown
        twitter.com
        104.244.42.1
        truefalse
          unknown
          prod.detectportal.prod.cloudops.mozgcp.net
          34.107.221.82
          truefalse
            unknown
            services.addons.mozilla.org
            151.101.1.91
            truefalse
              unknown
              dyna.wikimedia.org
              185.15.59.224
              truefalse
                unknown
                prod.remote-settings.prod.webservices.mozgcp.net
                34.149.100.209
                truefalse
                  unknown
                  contile.services.mozilla.com
                  34.117.188.166
                  truefalse
                    unknown
                    youtube.com
                    172.217.18.14
                    truefalse
                      unknown
                      prod.content-signature-chains.prod.webservices.mozgcp.net
                      34.160.144.191
                      truefalse
                        unknown
                        youtube-ui.l.google.com
                        142.250.186.78
                        truefalse
                          unknown
                          us-west1.prod.sumo.prod.webservices.mozgcp.net
                          34.149.128.2
                          truefalse
                            unknown
                            reddit.map.fastly.net
                            151.101.193.140
                            truefalse
                              unknown
                              ipv4only.arpa
                              192.0.0.170
                              truefalse
                                unknown
                                prod.ads.prod.webservices.mozgcp.net
                                34.117.188.166
                                truefalse
                                  unknown
                                  push.services.mozilla.com
                                  34.107.243.93
                                  truefalse
                                    unknown
                                    normandy-cdn.services.mozilla.com
                                    35.201.103.21
                                    truefalse
                                      unknown
                                      telemetry-incoming.r53-2.services.mozilla.com
                                      34.120.208.123
                                      truefalse
                                        unknown
                                        www.reddit.com
                                        unknown
                                        unknownfalse
                                          unknown
                                          spocs.getpocket.com
                                          unknown
                                          unknownfalse
                                            unknown
                                            content-signature-2.cdn.mozilla.net
                                            unknown
                                            unknownfalse
                                              unknown
                                              support.mozilla.org
                                              unknown
                                              unknownfalse
                                                unknown
                                                firefox.settings.services.mozilla.com
                                                unknown
                                                unknownfalse
                                                  unknown
                                                  www.youtube.com
                                                  unknown
                                                  unknownfalse
                                                    unknown
                                                    www.facebook.com
                                                    unknown
                                                    unknownfalse
                                                      unknown
                                                      detectportal.firefox.com
                                                      unknown
                                                      unknownfalse
                                                        unknown
                                                        normandy.cdn.mozilla.net
                                                        unknown
                                                        unknownfalse
                                                          unknown
                                                          shavar.services.mozilla.com
                                                          unknown
                                                          unknownfalse
                                                            unknown
                                                            www.wikipedia.org
                                                            unknown
                                                            unknownfalse
                                                              unknown
                                                              NameSourceMaliciousAntivirus DetectionReputation
                                                              https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                unknown
                                                                https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_lfirefox.exe, 00000011.00000002.2909769914.0000023681CC4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://detectportal.firefox.com/firefox.exe, 0000000D.00000003.1873248302.00000197B299F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://datastudio.google.com/embed/reporting/firefox.exe, 0000000D.00000003.1892628806.00000197B1529000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                http://www.mozilla.com0gmpopenh264.dll.tmp.13.drfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.firefox.exe, 0000000F.00000002.2910506418.000001873B9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.00000210165E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2913450862.0000023681F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecyclfirefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://merino.services.mozilla.com/api/v1/suggestfirefox.exe, 00000010.00000002.2910693510.0000021016586000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2909769914.0000023681C8F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protectfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://www.leboncoin.fr/firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://spocs.getpocket.com/spocsfirefox.exe, 0000000D.00000003.1877141584.00000197B1680000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1852674740.00000197BC1D8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://shavar.services.mozilla.comfirefox.exe, 0000000D.00000003.1876804430.00000197B25B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://completion.amazon.com/search/complete?q=firefox.exe, 0000000D.00000003.1703392153.00000197AFF00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703528651.00000197B011F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703644300.00000197B013C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703880593.00000197B0177000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703755105.00000197B015A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-reportfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://ads.stickyadstv.com/firefox-etpfirefox.exe, 0000000D.00000003.1892984020.00000197B0CCB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892984020.00000197B0C9B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://identity.mozilla.com/ids/ecosystem_telemetryUfirefox.exe, 0000000D.00000003.1841954799.00000197BC28E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tabfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://monitor.firefox.com/breach-details/firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEMfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://xhr.spec.whatwg.org/#sync-warningfirefox.exe, 0000000D.00000003.1858978870.00000197B8522000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1880365938.00000197B8522000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                • URL Reputation: safe
                                                                unknown
                                                                https://www.amazon.com/exec/obidos/external-search/firefox.exe, 0000000D.00000003.1751186963.00000197B85FD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703880593.00000197B0177000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703755105.00000197B015A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1808115899.00000197B18DE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858195242.00000197B8864000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  unknown
                                                                  https://www.msn.comfirefox.exe, 0000000D.00000003.1862671811.00000197B37B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    unknown
                                                                    https://github.com/mozilla-services/screenshotsfirefox.exe, 0000000D.00000003.1703392153.00000197AFF00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703528651.00000197B011F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703644300.00000197B013C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703880593.00000197B0177000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703755105.00000197B015A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://services.addons.mozilla.org/api/v4/addons/addon/firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://tracking-protection-issues.herokuapp.com/newfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-reportfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://youtube.com/firefox.exe, 0000000D.00000003.1862671811.00000197B37B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://content-signature-2.cdn.mozilla.net/firefox.exe, 0000000D.00000003.1857900788.00000197B8893000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94firefox.exe, 0000000F.00000002.2910506418.000001873B9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.00000210165E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2913450862.0000023681F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                          unknown
                                                                          https://app.adjust.com/167k4ih?campaign=firefox-desktop&adgroup=pb&creative=focus-omc172&redirect=htfirefox.exe, 0000000D.00000003.1841954799.00000197BC217000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-reportfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://api.accounts.firefox.com/v1firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://www.amazon.com/firefox.exe, 0000000D.00000003.1845020843.00000197B9689000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                              unknown
                                                                              https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullScfirefox.exe, 0000000D.00000003.1858978870.00000197B8522000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1880365938.00000197B8522000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protectionsfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                              • URL Reputation: safe
                                                                              unknown
                                                                              https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctafirefox.exe, 0000000F.00000002.2910506418.000001873B9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.00000210165E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2913450862.0000023681F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                unknown
                                                                                http://win.mail.ru/cgi-bin/sentmsg?mailto=%sfirefox.exe, 0000000D.00000003.1902877803.00000197AC37D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • URL Reputation: safe
                                                                                unknown
                                                                                https://www.youtube.com/firefox.exe, 0000000D.00000003.1845020843.00000197B9689000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.000002101650A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2909769914.0000023681C0C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  https://youtube.com/account?=htt==file.exe, 00000000.00000003.1721932362.00000000015EE000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1724360728.00000000015F4000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1722046144.00000000015F3000.00000004.00000020.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    https://bugzilla.mozilla.org/show_bug.cgi?id=1283601firefox.exe, 0000000D.00000003.1773753098.00000197B136D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1773708208.00000197B135A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shieldfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://MD8.mozilla.org/1/mfirefox.exe, 0000000D.00000003.1752687892.00000197B15A3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://www.bbc.co.uk/firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      unknown
                                                                                      https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=firefox.exe, 00000011.00000002.2909769914.0000023681CC4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      • URL Reputation: safe
                                                                                      unknown
                                                                                      http://127.0.0.1:firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        https://bugzilla.mozilla.org/show_bug.cgi?id=1266220firefox.exe, 0000000D.00000003.1773708208.00000197B135A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://bugzilla.mofirefox.exe, 0000000D.00000003.1853610015.00000197BBA57000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://mitmdetection.services.mozilla.com/firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://youtube.com/account?=recovery.jsonlz4.tmp.13.drfalse
                                                                                          unknown
                                                                                          https://shavar.services.mozilla.com/firefox.exe, 0000000D.00000003.1856425879.00000197B8E41000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapturefirefox.exe, 0000000D.00000003.1880365938.00000197B851B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858978870.00000197B851B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1880365938.00000197B8532000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858978870.00000197B8532000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://spocs.getpocket.com/firefox.exe, 00000010.00000002.2910693510.0000021016512000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2909769914.0000023681C13000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://services.addons.mozilla.org/api/v4/abuse/report/addon/firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-ffirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                          • URL Reputation: safe
                                                                                          unknown
                                                                                          https://www.iqiyi.com/firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            unknown
                                                                                            https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_rfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                              unknown
                                                                                              https://monitor.firefox.com/user/breach-stats?includeResolved=truefirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-reportfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                              • URL Reputation: safe
                                                                                              unknown
                                                                                              https://addons.mozilla.org/firefox.exe, 0000000D.00000003.1844412980.00000197BBAE3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                unknown
                                                                                                http://a9.com/-/spec/opensearch/1.0/firefox.exe, 0000000D.00000003.1752687892.00000197B1592000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1881190531.00000197B1592000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                https://safebrowsing.google.com/safebrowsing/diagnostic?site=firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                https://monitor.firefox.com/user/dashboardfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_IDfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                https://monitor.firefox.com/aboutfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                http://mozilla.org/MPL/2.0/.firefox.exe, 0000000D.00000003.1872616439.00000197B2DB2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875405020.00000197B37E6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1798459647.00000197B05D9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864839649.00000197B28E7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767291792.00000197B1BBD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1789431887.00000197B17DE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1767291792.00000197B1B83000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1705942193.00000197B014F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855093710.00000197B05E1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845020843.00000197B9664000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864063479.00000197B2DB2000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1796807540.00000197B1BBE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1791895714.00000197B1B83000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1892231444.00000197B8334000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1792646499.00000197B17D6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1716006685.00000197B13F3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1716529367.00000197B05DD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1756919838.00000197B1896000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1913519359.00000197B13EF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1824707891.00000197B17D6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862671811.00000197B37E6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  unknown
                                                                                                  https://account.bellmedia.cfirefox.exe, 0000000D.00000003.1862671811.00000197B37B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  http://youtube.com/firefox.exe, 0000000D.00000003.1752687892.00000197B1553000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    unknown
                                                                                                    https://login.microsoftonline.comfirefox.exe, 0000000D.00000003.1863424733.00000197B3741000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862671811.00000197B37B2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://coverage.mozilla.orgfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    http://crl.thawte.com/ThawteTimestampingCA.crl0gmpopenh264.dll.tmp.13.drfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://www.zhihu.com/firefox.exe, 0000000D.00000003.1859302934.00000197B83DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    http://a9.com/-/spec/opensearch/1.1/firefox.exe, 0000000D.00000003.1752687892.00000197B1592000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1881190531.00000197B1592000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://infra.spec.whatwg.org/#ascii-whitespacefirefox.exe, 0000000D.00000003.1800786566.00000197B8444000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://blocked.cdn.mozilla.net/firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://json-schema.org/draft/2019-09/schemafirefox.exe, 0000000D.00000003.1880173806.00000197B89B5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1856753387.00000197B89B0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1750252391.00000197B89B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    http://developer.mozilla.org/en/docs/DOM:element.addEventListenerfirefox.exe, 0000000D.00000003.1880365938.00000197B851B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1858978870.00000197B851B000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://profiler.firefox.comfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://outlook.live.com/default.aspx?rru=compose&to=%sfirefox.exe, 0000000D.00000003.1817475557.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1705489466.00000197AF933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905992583.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712714272.00000197AF933000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://identity.mozilla.com/apps/relayfirefox.exe, 0000000D.00000003.1880126318.00000197B9612000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845787217.00000197B9611000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://mozilla.cloudflare-dns.com/dns-queryfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2firefox.exe, 0000000D.00000003.1872509804.00000197B388E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860648925.00000197B3883000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://bugzilla.mozilla.org/show_bug.cgi?id=1678448firefox.exe, 0000000D.00000003.1773753098.00000197B136D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1773708208.00000197B135A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://mail.yahoo.co.jp/compose/?To=%sfirefox.exe, 0000000D.00000003.1817475557.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1902877803.00000197AC37D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1705489466.00000197AF933000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1905992583.00000197AF939000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1712714272.00000197AF933000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      unknown
                                                                                                      https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgfirefox.exe, 0000000F.00000002.2910506418.000001873B9CB000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.2910693510.00000210165E9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.2913450862.0000023681F03000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://contile.services.mozilla.com/v1/tilesfirefox.exe, 0000000D.00000003.1751186963.00000197B8573000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://www.amazon.co.uk/firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        unknown
                                                                                                        https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/firefox.exe, 0000000D.00000003.1853610015.00000197BBA57000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://monitor.firefox.com/user/preferencesfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://screenshots.firefox.com/firefox.exe, 0000000D.00000003.1703755105.00000197B015A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://truecolors.firefox.com/firefox.exe, 0000000D.00000003.1844412980.00000197BBAE3000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://www.google.com/searchfirefox.exe, 0000000D.00000003.1827561238.00000197B18F1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1757229439.00000197B18FE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1826038663.00000197B18EE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1752687892.00000197B1553000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703392153.00000197AFF00000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703528651.00000197B011F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703644300.00000197B013C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703880593.00000197B0177000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1703755105.00000197B015A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1808115899.00000197B18DE000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          unknown
                                                                                                          https://relay.firefox.com/api/v1/firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                            unknown
                                                                                                            https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-reportfirefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://topsites.services.mozilla.com/cid/firefox.exe, 0000000F.00000002.2910127652.000001873B760000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.2909141564.0000021016400000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.2912881450.0000023681D20000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                              unknown
                                                                                                              https://www.wykop.pl/firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              https://twitter.com/firefox.exe, 0000000D.00000003.1845020843.00000197B9689000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                unknown
                                                                                                                https://www.olx.pl/firefox.exe, 0000000D.00000003.1857900788.00000197B8885000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1859302934.00000197B83DC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                • No. of IPs < 25%
                                                                                                                • 25% < No. of IPs < 50%
                                                                                                                • 50% < No. of IPs < 75%
                                                                                                                • 75% < No. of IPs
                                                                                                                IPDomainCountryFlagASNASN NameMalicious
                                                                                                                151.101.1.91
                                                                                                                services.addons.mozilla.orgUnited States
                                                                                                                54113FASTLYUSfalse
                                                                                                                142.251.116.113
                                                                                                                unknownUnited States
                                                                                                                15169GOOGLEUSfalse
                                                                                                                34.149.100.209
                                                                                                                prod.remote-settings.prod.webservices.mozgcp.netUnited States
                                                                                                                2686ATGS-MMD-ASUSfalse
                                                                                                                34.107.243.93
                                                                                                                push.services.mozilla.comUnited States
                                                                                                                15169GOOGLEUSfalse
                                                                                                                34.107.221.82
                                                                                                                prod.detectportal.prod.cloudops.mozgcp.netUnited States
                                                                                                                15169GOOGLEUSfalse
                                                                                                                35.244.181.201
                                                                                                                prod.balrog.prod.cloudops.mozgcp.netUnited States
                                                                                                                15169GOOGLEUSfalse
                                                                                                                34.117.188.166
                                                                                                                contile.services.mozilla.comUnited States
                                                                                                                139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                                                                                                35.201.103.21
                                                                                                                normandy-cdn.services.mozilla.comUnited States
                                                                                                                15169GOOGLEUSfalse
                                                                                                                35.190.72.216
                                                                                                                prod.classify-client.prod.webservices.mozgcp.netUnited States
                                                                                                                15169GOOGLEUSfalse
                                                                                                                34.160.144.191
                                                                                                                prod.content-signature-chains.prod.webservices.mozgcp.netUnited States
                                                                                                                2686ATGS-MMD-ASUSfalse
                                                                                                                34.120.208.123
                                                                                                                telemetry-incoming.r53-2.services.mozilla.comUnited States
                                                                                                                15169GOOGLEUSfalse
                                                                                                                IP
                                                                                                                127.0.0.1
                                                                                                                Joe Sandbox version:41.0.0 Charoite
                                                                                                                Analysis ID:1546574
                                                                                                                Start date and time:2024-11-01 06:16:06 +01:00
                                                                                                                Joe Sandbox product:CloudBasic
                                                                                                                Overall analysis duration:0h 6m 32s
                                                                                                                Hypervisor based Inspection enabled:false
                                                                                                                Report type:full
                                                                                                                Cookbook file name:default.jbs
                                                                                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                Number of analysed new started processes analysed:22
                                                                                                                Number of new started drivers analysed:0
                                                                                                                Number of existing processes analysed:0
                                                                                                                Number of existing drivers analysed:0
                                                                                                                Number of injected processes analysed:0
                                                                                                                Technologies:
                                                                                                                • HCA enabled
                                                                                                                • EGA enabled
                                                                                                                • AMSI enabled
                                                                                                                Analysis Mode:default
                                                                                                                Analysis stop reason:Timeout
                                                                                                                Sample name:file.exe
                                                                                                                Detection:MAL
                                                                                                                Classification:mal72.troj.evad.winEXE@34/34@66/12
                                                                                                                EGA Information:
                                                                                                                • Successful, ratio: 50%
                                                                                                                HCA Information:
                                                                                                                • Successful, ratio: 94%
                                                                                                                • Number of executed functions: 41
                                                                                                                • Number of non-executed functions: 311
                                                                                                                Cookbook Comments:
                                                                                                                • Found application associated with file extension: .exe
                                                                                                                • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                                                • Excluded IPs from analysis (whitelisted): 35.160.212.113, 54.185.230.140, 52.11.191.138, 142.250.186.110, 2.22.61.56, 2.22.61.59, 172.217.18.14, 142.250.186.106, 142.250.185.234
                                                                                                                • Excluded domains from analysis (whitelisted): fs.microsoft.com, shavar.prod.mozaws.net, ciscobinary.openh264.org, slscr.update.microsoft.com, otelrules.azureedge.net, incoming.telemetry.mozilla.org, ctldl.windowsupdate.com, a17.rackcdn.com.mdc.edgesuite.net, detectportal.prod.mozaws.net, aus5.mozilla.org, fe3cr.delivery.mp.microsoft.com, a19.dscg10.akamai.net, ocsp.digicert.com, redirector.gvt1.com, safebrowsing.googleapis.com, location.services.mozilla.com
                                                                                                                • Not all processes where analyzed, report is missing behavior information
                                                                                                                • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                • Report size getting too big, too many NtCreateFile calls found.
                                                                                                                • Report size getting too big, too many NtOpenFile calls found.
                                                                                                                TimeTypeDescription
                                                                                                                01:17:06API Interceptor1x Sleep call for process: firefox.exe modified
                                                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                34.117.188.166file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                    151.101.1.91file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                        34.149.100.209file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                            example.orgfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 93.184.215.14
                                                                                                                                                                            twitter.comfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 104.244.42.65
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 104.244.42.129
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 104.244.42.1
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 104.244.42.65
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 104.244.42.65
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 104.244.42.65
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 104.244.42.1
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 104.244.42.65
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 104.244.42.129
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 104.244.42.129
                                                                                                                                                                            star-mini.c10r.facebook.comfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 157.240.0.35
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 157.240.253.35
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 157.240.0.35
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 157.240.252.35
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 157.240.0.35
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 157.240.253.35
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 157.240.0.35
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 157.240.251.35
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 157.240.0.35
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 157.240.251.35
                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                            FASTLYUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                            https://my-homepagero.sa.com/exml/Get hashmaliciousHTMLPhisherBrowse
                                                                                                                                                                            • 151.101.65.229
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 151.101.65.91
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 151.101.193.91
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 151.101.129.91
                                                                                                                                                                            GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 34.117.188.166
                                                                                                                                                                            ATGS-MMD-ASUSfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                            fb0aa01abe9d8e4037eb3473ca6e2dcafile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                            • 142.251.116.113
                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                            • 142.251.116.113
                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                            • 142.251.116.113
                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                            • 142.251.116.113
                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                            • 142.251.116.113
                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                            • 142.251.116.113
                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                            • 142.251.116.113
                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                            • 142.251.116.113
                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                            • 142.251.116.113
                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            • 35.244.181.201
                                                                                                                                                                            • 151.101.1.91
                                                                                                                                                                            • 142.251.116.113
                                                                                                                                                                            • 34.149.100.209
                                                                                                                                                                            • 34.160.144.191
                                                                                                                                                                            • 34.120.208.123
                                                                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                            C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):7813
                                                                                                                                                                                                Entropy (8bit):5.178153191175914
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:192:gIXjMXTvYcbhbVbTbfbRbObtbyEl7nYNuJA6WnSrDtTUd/SkDry:7YUcNhnzFSJ4NNBnSrDhUd/0
                                                                                                                                                                                                MD5:5AD0C508FD21972A4AFC936F7D959910
                                                                                                                                                                                                SHA1:D86D20634462EBFE05327DAADFD1CF7B07660B18
                                                                                                                                                                                                SHA-256:F76E40F1F7C0929DE56F6C0B871DA829988C5D5BE8316EFEC769A0336BB67699
                                                                                                                                                                                                SHA-512:D1CA5BB279F6C026C774299860124195E6F282E4EF6BE4002D0637E248A4DAA02C9E6596228876C0BEFD256D829165D1163749AD46B6B35403E969E8B418C5BC
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"type":"uninstall","id":"b361e58a-dc1e-4249-aca3-986e9eec1e50","creationDate":"2024-11-01T06:52:35.291Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):7813
                                                                                                                                                                                                Entropy (8bit):5.178153191175914
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:192:gIXjMXTvYcbhbVbTbfbRbObtbyEl7nYNuJA6WnSrDtTUd/SkDry:7YUcNhnzFSJ4NNBnSrDhUd/0
                                                                                                                                                                                                MD5:5AD0C508FD21972A4AFC936F7D959910
                                                                                                                                                                                                SHA1:D86D20634462EBFE05327DAADFD1CF7B07660B18
                                                                                                                                                                                                SHA-256:F76E40F1F7C0929DE56F6C0B871DA829988C5D5BE8316EFEC769A0336BB67699
                                                                                                                                                                                                SHA-512:D1CA5BB279F6C026C774299860124195E6F282E4EF6BE4002D0637E248A4DAA02C9E6596228876C0BEFD256D829165D1163749AD46B6B35403E969E8B418C5BC
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"type":"uninstall","id":"b361e58a-dc1e-4249-aca3-986e9eec1e50","creationDate":"2024-11-01T06:52:35.291Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):32768
                                                                                                                                                                                                Entropy (8bit):0.4593089050301797
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:48:9SP0nUgwyZXYI65yFRX2D3GNTTfyn0Mk1iA:9SDKaIjo3UzyE1L
                                                                                                                                                                                                MD5:D910AD167F0217587501FDCDB33CC544
                                                                                                                                                                                                SHA1:2F57441CEFDC781011B53C1C5D29AC54835AFC1D
                                                                                                                                                                                                SHA-256:E3699D9404A3FFC1AFF0CA8A3972DC0EF38BDAB927741E9F627C7C55CEA42E81
                                                                                                                                                                                                SHA-512:F1871BF28FF25EE52BDB99C7A80AB715C7CAC164DCD2FD87E681168EE927FD2C5E80E03C91BB638D955A4627213BF575FF4D9EECAEDA7718C128CF2CE8F7CB3D
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:... ftypisom....isomiso2avc1mp41....free....mdat..........E...H..,. .#..x264 - core 152 r2851 ba24899 - H.264/MPEG-4 AVC codec - Copyleft 2003-2017 - http://www.videolan.org/x264.html - options: cabac=1 ref=3 deblock=1:0:0 analyse=0x3:0x113 me=hex subme=7 psy=1 psy_rd=1.00:0.00 mixed_ref=1 me_range=16 chroma_me=1 trellis=1 8x8dct=1 cqm=0 deadzone=21,11 fast_pskip=1 chroma_qp_offset=-2 threads=4 lookahead_threads=1 sliced_threads=0 nr=0 decimate=1 interlaced=0 bluray_compat=0 constrained_intra=0 bframes=3 b_pyramid=2 b_adapt=1 b_bias=0 direct=1 weightb=1 open_gop=0 weightp=2 keyint=250 keyint_min=25 scenecut=40 intra_refresh=0 rc_lookahead=40 rc=crf mbtree=1 crf=23.0 qcomp=0.60 qpmin=0 qpmax=69 qpstep=4 ip_ratio=1.40 aq=1:1.00......e...+...s|.kG3...'.u.."...,J.w.~.d\..(K....!.+..;....h....(.T.*...M......0..~L..8..B..A.y..R..,.zBP.';j.@.].w..........c......C=.'f....gI.$^.......m5V.L...{U..%V[....8......B..i..^,....:...,..5.m.%dA....moov...lmvhd...................(...........
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):453023
                                                                                                                                                                                                Entropy (8bit):7.997718157581587
                                                                                                                                                                                                Encrypted:true
                                                                                                                                                                                                SSDEEP:12288:tESTeqTI2r4ZbCgUKWKNeRcPMb6qlV7hVZe3:tEsed2Xh9/bdzZe3
                                                                                                                                                                                                MD5:85430BAED3398695717B0263807CF97C
                                                                                                                                                                                                SHA1:FFFBEE923CEA216F50FCE5D54219A188A5100F41
                                                                                                                                                                                                SHA-256:A9F4281F82B3579581C389E8583DC9F477C7FD0E20C9DFC91A2E611E21E3407E
                                                                                                                                                                                                SHA-512:06511F1F6C6D44D076B3C593528C26A602348D9C41689DBF5FF716B671C3CA5756B12CB2E5869F836DEDCE27B1A5CFE79B93C707FD01F8E84B620923BB61B5F1
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:PK.........bN...R..........gmpopenh264.dll..|.E.0.=..I.....1....4f1q.`.........q.....'+....h*m{.z..o_.{w........$..($A!...|L...B&A2.s.{..Dd......c.U.U..9u.S...K.l`...../.d.-....|.....&....9......wn..x......i.#O.+.Y.l......+....,3.3f..\..c.SSS,............N...GG...F.'.&.:'.K.Z&.>.@.g..M...M.`...*.........ZR....^jg.G.Kb.o~va.....<Z..1.#.O.e.....D..X..i..$imBW..Q&.......P.....,M.,..:.c...-...\......*.....-i.K.I..4.a..6..*...Ov=...W..F.CH.>...a.'.x...#@f...d..u.1....OV.1o}....g.5.._.3.J.Hi.Z.ipM....b.Z....%.G..F................/..3.q..J.....o...%.g.N.*.}..).3.N%.!..q*........^I.m..~...6.#.~+.....A...I]r...x..*.<IYj....p0..`S.M@.E..f.=.;!.@.....E..E....... .0.n....Jd..d......uM.-.qI.lR..z..=}..r.D.XLZ....x.$..|c.1.cUkM.&.Qn]..a]t.h..*.!.6 7..Jd.DvKJ"Wgd*%n...w...Jni.inmr.@M.$'Z.s....#)%..Rs..:.h....R....\..t.6..'.g.........Uj+F.cr:|..!..K.W.Y...17......,....r.....>.N..3.R.Y.._\...Ir.DNJdM... .k...&V-....z.%...-...D..i..&...6....7.2T).>..0..%.&.
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):3621
                                                                                                                                                                                                Entropy (8bit):4.929552771807484
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:96:8S+OfJQPUFpOdwNIOdYVjvYcXaNLBLX8P:8S+OBIUjOdwiOdYVjjwLBLX8P
                                                                                                                                                                                                MD5:E809243F7F89537017D9D5983F307DC8
                                                                                                                                                                                                SHA1:02B8F8445EA22D91B85FE9476A9E014F5E454B54
                                                                                                                                                                                                SHA-256:AB3FC16C6A28C30092CEFCFEFE7032D831B9241BA118D490405C58C5E0CD3156
                                                                                                                                                                                                SHA-512:40CA0EF1362A37AA906742639274E6660D5579E8750A2E61D09FEF42DD3819FE83C8A8E318213E325B095FAD818997EB354AC9C733D84B5F0C7226ED6133A402
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"c5d95379-f4ee-4629-a507-6f15a0e93cd4","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-03T11:50:29.548Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):3621
                                                                                                                                                                                                Entropy (8bit):4.929552771807484
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:96:8S+OfJQPUFpOdwNIOdYVjvYcXaNLBLX8P:8S+OBIUjOdwiOdYVjjwLBLX8P
                                                                                                                                                                                                MD5:E809243F7F89537017D9D5983F307DC8
                                                                                                                                                                                                SHA1:02B8F8445EA22D91B85FE9476A9E014F5E454B54
                                                                                                                                                                                                SHA-256:AB3FC16C6A28C30092CEFCFEFE7032D831B9241BA118D490405C58C5E0CD3156
                                                                                                                                                                                                SHA-512:40CA0EF1362A37AA906742639274E6660D5579E8750A2E61D09FEF42DD3819FE83C8A8E318213E325B095FAD818997EB354AC9C733D84B5F0C7226ED6133A402
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"c5d95379-f4ee-4629-a507-6f15a0e93cd4","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-03T11:50:29.548Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 23432 bytes
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):5312
                                                                                                                                                                                                Entropy (8bit):6.615424734763731
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:96:V2YbKsKNU2xWrp327tGmD4wBON6h6cHaJVJuZMd0JGkkrw2D:VTx2x2t0FDJ4NpwZMd0EJws
                                                                                                                                                                                                MD5:1B9C8056D3619CE5A8C59B0C09873F17
                                                                                                                                                                                                SHA1:1015C630E1937AA63F6AB31743782ECB5D78CCD8
                                                                                                                                                                                                SHA-256:A6AE5DE0733FED050AB570AD9374FF4593D554F695B5AE4E2495871D171D34A3
                                                                                                                                                                                                SHA-512:B1DC9CC675D5476C270A2D5B214D3DF2B3856576ED7EFE92D9A606C2D9D34E781018902AE75CE9C1E25007BB7F8D8F7B52997E6F05B845EF44BAF22F614FE899
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:mozLz40..[....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 23432 bytes
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):5312
                                                                                                                                                                                                Entropy (8bit):6.615424734763731
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:96:V2YbKsKNU2xWrp327tGmD4wBON6h6cHaJVJuZMd0JGkkrw2D:VTx2x2t0FDJ4NpwZMd0EJws
                                                                                                                                                                                                MD5:1B9C8056D3619CE5A8C59B0C09873F17
                                                                                                                                                                                                SHA1:1015C630E1937AA63F6AB31743782ECB5D78CCD8
                                                                                                                                                                                                SHA-256:A6AE5DE0733FED050AB570AD9374FF4593D554F695B5AE4E2495871D171D34A3
                                                                                                                                                                                                SHA-512:B1DC9CC675D5476C270A2D5B214D3DF2B3856576ED7EFE92D9A606C2D9D34E781018902AE75CE9C1E25007BB7F8D8F7B52997E6F05B845EF44BAF22F614FE899
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:mozLz40..[....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):24
                                                                                                                                                                                                Entropy (8bit):3.91829583405449
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):24
                                                                                                                                                                                                Entropy (8bit):3.91829583405449
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):262144
                                                                                                                                                                                                Entropy (8bit):0.04905391753567332
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:24:DLivwae+Q8Uu50xj0aWe9LxYkKA25Q5tvAA:D6wae+QtMImelekKDa5
                                                                                                                                                                                                MD5:DD9D28E87ED57D16E65B14501B4E54D1
                                                                                                                                                                                                SHA1:793839B47326441BE2D1336BA9A61C9B948C578D
                                                                                                                                                                                                SHA-256:BB4E6C58C50BD6399ED70468C02B584595C29F010B66F864CD4D6B427FA365BC
                                                                                                                                                                                                SHA-512:A2626F6A3CBADE62E38DA5987729D99830D0C6AA134D4A9E615026A5F18ACBB11A2C3C80917DAD76DA90ED5BAA9B0454D4A3C2DD04436735E78C974BA1D035B1
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:SQLite format 3......@ ..........................................................................j......|....~.}.}z}-|.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):66
                                                                                                                                                                                                Entropy (8bit):4.837595020998689
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):66
                                                                                                                                                                                                Entropy (8bit):4.837595020998689
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):36830
                                                                                                                                                                                                Entropy (8bit):5.185924656884556
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:768:wI43DvfWXf4E6C4p4EC4Y4QfEWvM4B4QS4z4444XQ4U:wUfdvk
                                                                                                                                                                                                MD5:5656BA69BD2966108A461AAE35F60226
                                                                                                                                                                                                SHA1:9C2E5AE52D82CEA43C4A5FFF205A7700CF54D61C
                                                                                                                                                                                                SHA-256:587596712960B26EAC18CB354CCD633FFDB218E374A9D59EFEA843914D7AB299
                                                                                                                                                                                                SHA-512:38F715AD9156558B5D57CA2E75FB0FFE0C5C6728BD94484B8F15E090120DDD02DCE42DBC9CC7143AD6552460A5F3A40E577FAF1D76D5D40B25CDBE636F250054
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{60024e8e-cfd0-41e5-965d-7128c7dcf0e8}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):36830
                                                                                                                                                                                                Entropy (8bit):5.185924656884556
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:768:wI43DvfWXf4E6C4p4EC4Y4QfEWvM4B4QS4z4444XQ4U:wUfdvk
                                                                                                                                                                                                MD5:5656BA69BD2966108A461AAE35F60226
                                                                                                                                                                                                SHA1:9C2E5AE52D82CEA43C4A5FFF205A7700CF54D61C
                                                                                                                                                                                                SHA-256:587596712960B26EAC18CB354CCD633FFDB218E374A9D59EFEA843914D7AB299
                                                                                                                                                                                                SHA-512:38F715AD9156558B5D57CA2E75FB0FFE0C5C6728BD94484B8F15E090120DDD02DCE42DBC9CC7143AD6552460A5F3A40E577FAF1D76D5D40B25CDBE636F250054
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{60024e8e-cfd0-41e5-965d-7128c7dcf0e8}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):32768
                                                                                                                                                                                                Entropy (8bit):0.017262956703125623
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                                                                                                                                MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                                                                                                                                SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                                                                                                                                SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                                                                                                                                SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1021904
                                                                                                                                                                                                Entropy (8bit):6.648417932394748
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Joe Sandbox View:
                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1021904
                                                                                                                                                                                                Entropy (8bit):6.648417932394748
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Antivirus:
                                                                                                                                                                                                • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:ASCII text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):116
                                                                                                                                                                                                Entropy (8bit):4.968220104601006
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:ASCII text
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):116
                                                                                                                                                                                                Entropy (8bit):4.968220104601006
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):98304
                                                                                                                                                                                                Entropy (8bit):0.07335892763187632
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:12:DBl/A0OWla0mwPxRymgObsCVR45wcYR4fmnsCVR4zkiy+:DLhesh7Owd4+jil
                                                                                                                                                                                                MD5:85B70696E4C36497E34D6F394C02011E
                                                                                                                                                                                                SHA1:AA120D24AF9F0F00167AADE5C5386E103A8CF8C9
                                                                                                                                                                                                SHA-256:B8C38D38B1BD3AE9F59DC8E3BD6AA90D3F538E50613331E136C287A9A85CBE5A
                                                                                                                                                                                                SHA-512:53065E3D32630E78B5B6F339CE17E6CE2C7B99EE7FBBD279D81D3BF981A821377ECA50C78390CC5B1124AD26D5D8ADE193C3F30FA06621D91F96C1AF99D24447
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:SQLite format 3......@ ..........................................................................j......~s..F~s........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):32768
                                                                                                                                                                                                Entropy (8bit):0.035822017202226504
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:GtlstFM5GAFKrwWRSl1lstFM5GAFKrwWRttT89//alEl:GtWtO5hl1WtO5089XuM
                                                                                                                                                                                                MD5:32FA9B152F38C09639A4656E9D853C80
                                                                                                                                                                                                SHA1:7B7DFFF2A04AC0ACEF5EAD02384AEAB0DE7A0E5B
                                                                                                                                                                                                SHA-256:687863E47190D8277F547A7EC4DC9228611D0F0177457D7953733AE7672A18FB
                                                                                                                                                                                                SHA-512:496AAFA3EA09AF014E02133C8BCBC6250EEAC53926AC029230A254E00B7FD4453155F2BC27EAD967C05EB31AC9DF501D437A4F83F3ACD3DE1E047A3ED7CC8E19
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:..-.......................`.e ...p..4.Rm7T....+..-.......................`.e ...p..4.Rm7T....+........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:SQLite Write-Ahead Log, version 3007000
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):32824
                                                                                                                                                                                                Entropy (8bit):0.03981332616593857
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:Ol1HGvUl/olNXV8q0D3Kltl8rEXsxdwhml8XW3R2:KQEolFWqVDl8dMhm93w
                                                                                                                                                                                                MD5:712AD88C9B6C1193306AD5D9EE3FD82D
                                                                                                                                                                                                SHA1:FD9D88D4FD5B21E1461F84E29B286AFED4676F75
                                                                                                                                                                                                SHA-256:673A9884F5C45B4019650D59CBC7E87E073B4F47AA56E0662DD114F0CC05661A
                                                                                                                                                                                                SHA-512:C7EDC4477CB21BCA1D033E681FBA93C792E73CE5C4CC35F832C25CC743DCBF6BA5B688FF8A41477F1D6A711F04AA701382551BA5FEB7578370E03D8FF02B82BB
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:7....-...........p..4.Rm..t...$..........p..4.Rm.`... e................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):13254
                                                                                                                                                                                                Entropy (8bit):5.495528976450615
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:192:JnaRtLYbBp6Hhj4qyaaXV6KhWNhjy5RfGNBw8drSl:0edq/2S8cwE0
                                                                                                                                                                                                MD5:FCDA94A627B7823FE9B07E98D6B32725
                                                                                                                                                                                                SHA1:6E401383D5E1FFF71D732B065F2E8C89A6415C62
                                                                                                                                                                                                SHA-256:4B0B765DACC6C4EA526E1907FB071DCBCF09023771B6450F02A1D0FF6E873395
                                                                                                                                                                                                SHA-512:FFE9B34A5A4F259A45E6A38E90B5DDB76589F4E6889AA64B9DCF53341C3CA61D249FDA18E32BD50AAF654BD1AF238BE14BFED371484A8B00F2362E218DC2EF82
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1730443925);..user_pref("app.update.lastUpdateTime.background-update-timer", 1730443925);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1730443925);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173044
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):13254
                                                                                                                                                                                                Entropy (8bit):5.495528976450615
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:192:JnaRtLYbBp6Hhj4qyaaXV6KhWNhjy5RfGNBw8drSl:0edq/2S8cwE0
                                                                                                                                                                                                MD5:FCDA94A627B7823FE9B07E98D6B32725
                                                                                                                                                                                                SHA1:6E401383D5E1FFF71D732B065F2E8C89A6415C62
                                                                                                                                                                                                SHA-256:4B0B765DACC6C4EA526E1907FB071DCBCF09023771B6450F02A1D0FF6E873395
                                                                                                                                                                                                SHA-512:FFE9B34A5A4F259A45E6A38E90B5DDB76589F4E6889AA64B9DCF53341C3CA61D249FDA18E32BD50AAF654BD1AF238BE14BFED371484A8B00F2362E218DC2EF82
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1730443925);..user_pref("app.update.lastUpdateTime.background-update-timer", 1730443925);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1730443925);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173044
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):65536
                                                                                                                                                                                                Entropy (8bit):0.04062825861060003
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:6:ltBl/l4/WN1h4BEJYqWvLue3FMOrMZ0l:DBl/WuntfJiFxMZO
                                                                                                                                                                                                MD5:18F65713B07CB441E6A98655B726D098
                                                                                                                                                                                                SHA1:2CEFA32BC26B25BE81C411B60C9925CB0F1F8F88
                                                                                                                                                                                                SHA-256:B6C268E48546B113551A5AF9CA86BB6A462A512DE6C9289315E125CEB0FD8621
                                                                                                                                                                                                SHA-512:A6871076C7D7ED53B630F9F144ED04303AD54A2E60B94ECA2AA96964D1AB375EEFDCA86CE0D3EB0E9DBB81470C6BD159877125A080C95EB17E54A52427F805FB
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:SQLite format 3......@ ..........................................................................j.......x..x..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):90
                                                                                                                                                                                                Entropy (8bit):4.194538242412464
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):90
                                                                                                                                                                                                Entropy (8bit):4.194538242412464
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1575
                                                                                                                                                                                                Entropy (8bit):6.335908006828319
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:24:v+USUGlcAxSAuLXnIgbI/pnxQwRlszT5sKt0A3eHVQj6TYNamhujJlOsIomNVr0M:GUpOxETgnR6v3eHTS4JlIqD4
                                                                                                                                                                                                MD5:D3AF2A2BEF1412EDC57C55BAEA729BFA
                                                                                                                                                                                                SHA1:BC5244CBE89F4CB01F45A5C0C5221EBF2B1E8368
                                                                                                                                                                                                SHA-256:5B6BF2BBA142C4B60469D81D38128DF65A876F1187832D0409700DC04B019E5B
                                                                                                                                                                                                SHA-512:A59AA0899DF1858079D9DE0BF82F25E626D0AC6497CFB796BA32C107C184DBA2407C60C09ED6AE58366E30A223624DB38A063447765E6A725925BA0CF1BD19DB
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{5d3b830f-691b-4b21-b533-b5493ef9d881}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730443930225,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..jUpdate...6,"startTim..`895130...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..fexpiry...02172,"originA..
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1575
                                                                                                                                                                                                Entropy (8bit):6.335908006828319
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:24:v+USUGlcAxSAuLXnIgbI/pnxQwRlszT5sKt0A3eHVQj6TYNamhujJlOsIomNVr0M:GUpOxETgnR6v3eHTS4JlIqD4
                                                                                                                                                                                                MD5:D3AF2A2BEF1412EDC57C55BAEA729BFA
                                                                                                                                                                                                SHA1:BC5244CBE89F4CB01F45A5C0C5221EBF2B1E8368
                                                                                                                                                                                                SHA-256:5B6BF2BBA142C4B60469D81D38128DF65A876F1187832D0409700DC04B019E5B
                                                                                                                                                                                                SHA-512:A59AA0899DF1858079D9DE0BF82F25E626D0AC6497CFB796BA32C107C184DBA2407C60C09ED6AE58366E30A223624DB38A063447765E6A725925BA0CF1BD19DB
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{5d3b830f-691b-4b21-b533-b5493ef9d881}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730443930225,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..jUpdate...6,"startTim..`895130...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..fexpiry...02172,"originA..
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):1575
                                                                                                                                                                                                Entropy (8bit):6.335908006828319
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:24:v+USUGlcAxSAuLXnIgbI/pnxQwRlszT5sKt0A3eHVQj6TYNamhujJlOsIomNVr0M:GUpOxETgnR6v3eHTS4JlIqD4
                                                                                                                                                                                                MD5:D3AF2A2BEF1412EDC57C55BAEA729BFA
                                                                                                                                                                                                SHA1:BC5244CBE89F4CB01F45A5C0C5221EBF2B1E8368
                                                                                                                                                                                                SHA-256:5B6BF2BBA142C4B60469D81D38128DF65A876F1187832D0409700DC04B019E5B
                                                                                                                                                                                                SHA-512:A59AA0899DF1858079D9DE0BF82F25E626D0AC6497CFB796BA32C107C184DBA2407C60C09ED6AE58366E30A223624DB38A063447765E6A725925BA0CF1BD19DB
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{5d3b830f-691b-4b21-b533-b5493ef9d881}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730443930225,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..jUpdate...6,"startTim..`895130...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..fexpiry...02172,"originA..
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4096
                                                                                                                                                                                                Entropy (8bit):2.0836444556178684
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:24:JBwdh/cEUcR9PzNFPFHx/GJRBdkOrDcRB1trwDeAq2gRMyxr3:jnEUo9LXtR+JdkOnohYsl
                                                                                                                                                                                                MD5:8B40B1534FF0F4B533AF767EB5639A05
                                                                                                                                                                                                SHA1:63EDB539EA39AD09D701A36B535C4C087AE08CC9
                                                                                                                                                                                                SHA-256:AF275A19A5C2C682139266065D90C237282274D11C5619A121B7BDBDB252861B
                                                                                                                                                                                                SHA-512:54AF707698CED33C206B1B193DA414D630901762E88E37E99885A50D4D5F8DDC28367C9B401DFE251CF0552B4FA446EE28F78A97C9096AFB0F2898BFBB673B53
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4537
                                                                                                                                                                                                Entropy (8bit):5.0332024690709085
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:48:YrSAYKz6UQZpExB1+anOsW4Vh351VxWRzzc8eYMsku7f86SLAVL7if5FtsfAcbyk:ycKzyTEr5QFRzzcMvbw6KkCrrc2Rn27
                                                                                                                                                                                                MD5:29ED9C93A5224CE640870F3C2BA95E4A
                                                                                                                                                                                                SHA1:2D52D8BCD5D3727C10DECB344E1E3E317EBDC0F0
                                                                                                                                                                                                SHA-256:BD6DF7930FE949709A898196D4E4C6D2F9B207D04DC6B6B422BBA4D7E9F2E606
                                                                                                                                                                                                SHA-512:7E97470AE47A8EC7A5699D618CE7A8C4FDD6CDECB1229E14D15841844362FD1E256F20FCBBCD33E598AD75C72DFD934C3F53F5C7B22AA8238BD26619ADA0A63B
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-11-01T06:51:50.083Z","profileAgeCreated":1696333826043,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                File Type:JSON data
                                                                                                                                                                                                Category:dropped
                                                                                                                                                                                                Size (bytes):4537
                                                                                                                                                                                                Entropy (8bit):5.0332024690709085
                                                                                                                                                                                                Encrypted:false
                                                                                                                                                                                                SSDEEP:48:YrSAYKz6UQZpExB1+anOsW4Vh351VxWRzzc8eYMsku7f86SLAVL7if5FtsfAcbyk:ycKzyTEr5QFRzzcMvbw6KkCrrc2Rn27
                                                                                                                                                                                                MD5:29ED9C93A5224CE640870F3C2BA95E4A
                                                                                                                                                                                                SHA1:2D52D8BCD5D3727C10DECB344E1E3E317EBDC0F0
                                                                                                                                                                                                SHA-256:BD6DF7930FE949709A898196D4E4C6D2F9B207D04DC6B6B422BBA4D7E9F2E606
                                                                                                                                                                                                SHA-512:7E97470AE47A8EC7A5699D618CE7A8C4FDD6CDECB1229E14D15841844362FD1E256F20FCBBCD33E598AD75C72DFD934C3F53F5C7B22AA8238BD26619ADA0A63B
                                                                                                                                                                                                Malicious:false
                                                                                                                                                                                                Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-11-01T06:51:50.083Z","profileAgeCreated":1696333826043,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                Entropy (8bit):6.584659252846473
                                                                                                                                                                                                TrID:
                                                                                                                                                                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                File name:file.exe
                                                                                                                                                                                                File size:919'552 bytes
                                                                                                                                                                                                MD5:ab9a5055a57bf0ce6eb64d81699f6ac1
                                                                                                                                                                                                SHA1:4e4ac10f948fc734508def7d7389c986583ea8ad
                                                                                                                                                                                                SHA256:95f4d6588c28a487edcd91b95cebd864b43880aadcb6bd762474cf8733d4b4c0
                                                                                                                                                                                                SHA512:998fe74b06df851d5e08fd18bdfe724614f60dcc237f33f18cdafe51871fe50325086347f9cfd20a6bcf8e1744452e035e95de0ac4b2579f075e365f370f5407
                                                                                                                                                                                                SSDEEP:12288:KqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga/Tr:KqDEvCTbMWu7rQYlBQcBiT6rprG8abr
                                                                                                                                                                                                TLSH:44159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                                                                                                                                                                File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                                                                                                                                                Icon Hash:aaf3e3e3938382a0
                                                                                                                                                                                                Entrypoint:0x420577
                                                                                                                                                                                                Entrypoint Section:.text
                                                                                                                                                                                                Digitally signed:false
                                                                                                                                                                                                Imagebase:0x400000
                                                                                                                                                                                                Subsystem:windows gui
                                                                                                                                                                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                                                                                                                DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                Time Stamp:0x672463D5 [Fri Nov 1 05:15:01 2024 UTC]
                                                                                                                                                                                                TLS Callbacks:
                                                                                                                                                                                                CLR (.Net) Version:
                                                                                                                                                                                                OS Version Major:5
                                                                                                                                                                                                OS Version Minor:1
                                                                                                                                                                                                File Version Major:5
                                                                                                                                                                                                File Version Minor:1
                                                                                                                                                                                                Subsystem Version Major:5
                                                                                                                                                                                                Subsystem Version Minor:1
                                                                                                                                                                                                Import Hash:948cc502fe9226992dce9417f952fce3
                                                                                                                                                                                                Instruction
                                                                                                                                                                                                call 00007FAF1C926A03h
                                                                                                                                                                                                jmp 00007FAF1C92630Fh
                                                                                                                                                                                                push ebp
                                                                                                                                                                                                mov ebp, esp
                                                                                                                                                                                                push esi
                                                                                                                                                                                                push dword ptr [ebp+08h]
                                                                                                                                                                                                mov esi, ecx
                                                                                                                                                                                                call 00007FAF1C9264EDh
                                                                                                                                                                                                mov dword ptr [esi], 0049FDF0h
                                                                                                                                                                                                mov eax, esi
                                                                                                                                                                                                pop esi
                                                                                                                                                                                                pop ebp
                                                                                                                                                                                                retn 0004h
                                                                                                                                                                                                and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                mov eax, ecx
                                                                                                                                                                                                and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                mov dword ptr [ecx+04h], 0049FDF8h
                                                                                                                                                                                                mov dword ptr [ecx], 0049FDF0h
                                                                                                                                                                                                ret
                                                                                                                                                                                                push ebp
                                                                                                                                                                                                mov ebp, esp
                                                                                                                                                                                                push esi
                                                                                                                                                                                                push dword ptr [ebp+08h]
                                                                                                                                                                                                mov esi, ecx
                                                                                                                                                                                                call 00007FAF1C9264BAh
                                                                                                                                                                                                mov dword ptr [esi], 0049FE0Ch
                                                                                                                                                                                                mov eax, esi
                                                                                                                                                                                                pop esi
                                                                                                                                                                                                pop ebp
                                                                                                                                                                                                retn 0004h
                                                                                                                                                                                                and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                mov eax, ecx
                                                                                                                                                                                                and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                mov dword ptr [ecx+04h], 0049FE14h
                                                                                                                                                                                                mov dword ptr [ecx], 0049FE0Ch
                                                                                                                                                                                                ret
                                                                                                                                                                                                push ebp
                                                                                                                                                                                                mov ebp, esp
                                                                                                                                                                                                push esi
                                                                                                                                                                                                mov esi, ecx
                                                                                                                                                                                                lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                and dword ptr [eax], 00000000h
                                                                                                                                                                                                and dword ptr [eax+04h], 00000000h
                                                                                                                                                                                                push eax
                                                                                                                                                                                                mov eax, dword ptr [ebp+08h]
                                                                                                                                                                                                add eax, 04h
                                                                                                                                                                                                push eax
                                                                                                                                                                                                call 00007FAF1C9290ADh
                                                                                                                                                                                                pop ecx
                                                                                                                                                                                                pop ecx
                                                                                                                                                                                                mov eax, esi
                                                                                                                                                                                                pop esi
                                                                                                                                                                                                pop ebp
                                                                                                                                                                                                retn 0004h
                                                                                                                                                                                                lea eax, dword ptr [ecx+04h]
                                                                                                                                                                                                mov dword ptr [ecx], 0049FDD0h
                                                                                                                                                                                                push eax
                                                                                                                                                                                                call 00007FAF1C9290F8h
                                                                                                                                                                                                pop ecx
                                                                                                                                                                                                ret
                                                                                                                                                                                                push ebp
                                                                                                                                                                                                mov ebp, esp
                                                                                                                                                                                                push esi
                                                                                                                                                                                                mov esi, ecx
                                                                                                                                                                                                lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                push eax
                                                                                                                                                                                                call 00007FAF1C9290E1h
                                                                                                                                                                                                test byte ptr [ebp+08h], 00000001h
                                                                                                                                                                                                pop ecx
                                                                                                                                                                                                Programming Language:
                                                                                                                                                                                                • [ C ] VS2008 SP1 build 30729
                                                                                                                                                                                                • [IMP] VS2008 SP1 build 30729
                                                                                                                                                                                                NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9c28.rsrc
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                .rsrc0xd40000x9c280x9e00187e70c443150d261f6a7ea59e60e15cFalse0.3156398338607595data5.373037405233554IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                                                                                                                                RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                                                                                                                                RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                                                                                                                                RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                                                                                                                                RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                                                                                                                                RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                                                                                                                                RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                                                                                                                                RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                                                                                                                                RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                                                                                                                                RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                                                                                                                                RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                                                                                                                                                RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                                                                                                                                                RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                                                                                                                                RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                                                                                                                                RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                                                                                                                                RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                                                                                                                                RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                                                                                                                                RT_RCDATA0xdc7b80xef0data1.0028765690376569
                                                                                                                                                                                                RT_GROUP_ICON0xdd6a80x76dataEnglishGreat Britain0.6610169491525424
                                                                                                                                                                                                RT_GROUP_ICON0xdd7200x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                RT_GROUP_ICON0xdd7340x14dataEnglishGreat Britain1.15
                                                                                                                                                                                                RT_GROUP_ICON0xdd7480x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                RT_VERSION0xdd75c0xdcdataEnglishGreat Britain0.6181818181818182
                                                                                                                                                                                                RT_MANIFEST0xdd8380x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                                                                                                                                DLLImport
                                                                                                                                                                                                WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                                                                                                                                                VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                                                                                                                                                WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                                                                                                                                COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                                                                                                                                MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                                                                                                                                                WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                                                                                                                                                PSAPI.DLLGetProcessMemoryInfo
                                                                                                                                                                                                IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                                                                                                                                                USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                                                                                                                                                UxTheme.dllIsThemeActive
                                                                                                                                                                                                KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                                                                                                                                                USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                                                                                                                                                GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                                                                                                                                                COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                                                                                                                                ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                                                                                                                                                SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                                                                                                                                                ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                                                                                                                                                OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                                                                                                                                                Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                EnglishGreat Britain
                                                                                                                                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                                                                                2024-11-01T06:17:14.266940+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449762TCP
                                                                                                                                                                                                2024-11-01T06:17:52.536724+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.454328TCP
                                                                                                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                Nov 1, 2024 06:17:02.604901075 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                Nov 1, 2024 06:17:02.604952097 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:02.605674982 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                Nov 1, 2024 06:17:02.610219955 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                Nov 1, 2024 06:17:02.610239029 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:03.221509933 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:03.221694946 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                Nov 1, 2024 06:17:03.229509115 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                Nov 1, 2024 06:17:03.229558945 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:03.229626894 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                Nov 1, 2024 06:17:03.229706049 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:03.229860067 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                Nov 1, 2024 06:17:04.842529058 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:04.847605944 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:04.852897882 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:04.853058100 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:04.857990980 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.049443007 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.049525976 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.050286055 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.052484989 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.052529097 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.070724964 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.070812941 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.070928097 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.072791100 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.072828054 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.073487043 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:05.073512077 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.074265957 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:05.074450970 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:05.074474096 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.449779987 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.516047955 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:05.605057001 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:05.605099916 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.605365992 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:05.605510950 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:05.605693102 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:05.605706930 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.610168934 CET804974634.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.610270023 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:05.610383034 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:05.615520954 CET804974634.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.672758102 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.672853947 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.678114891 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.678229094 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.678251982 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.678374052 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.678437948 CET4434974134.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.678704023 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.678805113 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.678828001 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.678916931 CET49741443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.678929090 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:05.678953886 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.679027081 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.685290098 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:05.685312986 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.685529947 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.688020945 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.688035011 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.693969011 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.693991899 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.694057941 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:05.694116116 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.694174051 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.694308996 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.694317102 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.694547892 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.694547892 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:05.694645882 CET49743443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:05.694660902 CET4434974335.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.695261002 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.695331097 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.695508003 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.697952986 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:05.697983027 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.729271889 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:05.735213041 CET804974034.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.741846085 CET4974080192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:05.747585058 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:05.753312111 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.754504919 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:05.755143881 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:05.760708094 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.212732077 CET804974634.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.213469028 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:06.214466095 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.214534044 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:06.217221022 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:06.217230082 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.217456102 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.219136000 CET804974634.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.219182014 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:06.219293118 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:06.219307899 CET4434974534.160.144.191192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.219662905 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:06.219693899 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.219880104 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:06.219913006 CET4974680192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:06.219916105 CET49745443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:06.219960928 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:06.220171928 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:06.220186949 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.304994106 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.305491924 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:06.305545092 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.309429884 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:06.309448957 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.309525967 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:06.309640884 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.310233116 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:06.310245037 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:06.314137936 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:06.314153910 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.314203024 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:06.314584017 CET4434974734.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.314802885 CET49747443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:06.347786903 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.396527052 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:06.521567106 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:06.521653891 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.521742105 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:06.523003101 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:06.525481939 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:06.526623011 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.526674986 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:06.526726007 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.527900934 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.532466888 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:06.532617092 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:06.537498951 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.644666910 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.697421074 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:06.741952896 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:06.793811083 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.861917019 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.867335081 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.875335932 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:06.928453922 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:06.928463936 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.928684950 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.931566954 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:06.931660891 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:06.931687117 CET4434975034.160.144.191192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:06.931957960 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:06.931971073 CET49750443192.168.2.434.160.144.191
                                                                                                                                                                                                Nov 1, 2024 06:17:07.009825945 CET804975234.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.012978077 CET4975280192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:07.140266895 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.140377998 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:07.144975901 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:07.145020008 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.145101070 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:07.145162106 CET4434975134.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.145488024 CET49754443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:07.145571947 CET4434975434.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.145595074 CET49751443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:07.145745993 CET49754443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:07.147073984 CET49754443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:07.147113085 CET4434975434.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.450620890 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:07.455833912 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.458806038 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:07.459558964 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:07.464416027 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.702785969 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:07.707875967 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.754431963 CET4434975434.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.754532099 CET49754443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:07.759305000 CET49754443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:07.759336948 CET4434975434.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.759390116 CET49754443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:07.759489059 CET4434975434.117.188.166192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.759553909 CET49754443192.168.2.434.117.188.166
                                                                                                                                                                                                Nov 1, 2024 06:17:07.826438904 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.891268015 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:07.970791101 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:07.977339983 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.980679989 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:07.983283043 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:07.985831022 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.990561008 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:07.990710974 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:07.995578051 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.348768950 CET49758443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:08.348797083 CET4434975834.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.352780104 CET49758443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:08.354360104 CET49758443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:08.354377031 CET4434975834.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.367553949 CET49759443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:08.367587090 CET4434975935.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.368916035 CET49759443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:08.369158983 CET49759443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:08.369174957 CET4434975935.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.405421972 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:08.405505896 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.408852100 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:08.410806894 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:08.410846949 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.476479053 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:08.481427908 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.596198082 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.599112034 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.640135050 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:08.640274048 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:08.687648058 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:08.692611933 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.813884974 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.857486963 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:08.957628012 CET4434975834.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.957696915 CET49758443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:09.014528036 CET4434975935.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.014601946 CET49759443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:09.023602962 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.023669958 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:09.030966997 CET49759443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:09.030981064 CET4434975935.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.031740904 CET4434975935.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.073681116 CET49759443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:09.108367920 CET49758443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:09.108383894 CET4434975834.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.108517885 CET4434975834.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.108540058 CET49758443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:09.108546972 CET4434975834.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.109694004 CET49759443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:09.109746933 CET49759443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:09.110136986 CET4434975935.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.110280991 CET49759443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:09.110359907 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:09.110403061 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.110444069 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:09.110529900 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.110591888 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:09.319319963 CET4434975834.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.319401979 CET49758443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:09.682126045 CET49761443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:09.682147980 CET4434976134.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.685905933 CET49761443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:09.693475962 CET49761443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:09.693489075 CET4434976134.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.740019083 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:09.745229959 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.865159988 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.912858009 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:10.307924032 CET4434976134.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:10.308007002 CET49761443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:10.312092066 CET49761443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:10.312100887 CET4434976134.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:10.312190056 CET49761443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:10.312218904 CET4434976134.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:10.312266111 CET49761443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:14.118647099 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:14.123497009 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:14.266032934 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:14.319950104 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:14.640769005 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:14.645775080 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:14.763698101 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:14.803529024 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:15.479247093 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:15.479306936 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.481538057 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:15.482825041 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:15.482861042 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.839562893 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:15.845221996 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.885099888 CET49768443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:15.885181904 CET4434976834.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.885596991 CET49768443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:15.887058020 CET49768443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:15.887094975 CET4434976834.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.966727018 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.967082977 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:15.967114925 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.967904091 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:15.967998028 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.968013048 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:15.968310118 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:15.968338013 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.968424082 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:15.968590975 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:15.968624115 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:16.022587061 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:16.101207018 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:16.101274967 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:16.258498907 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:16.258543015 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:16.258583069 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:16.258753061 CET4434976734.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:16.258941889 CET49767443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:16.502450943 CET4434976834.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:16.502563000 CET49768443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:16.568635941 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:16.568723917 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:16.574470043 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:16.574534893 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:16.946644068 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:16.946676016 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:16.946979046 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:16.948617935 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:16.948676109 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:16.949670076 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:17.009831905 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:17.009866953 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:17.374849081 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:17.379698038 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:17.381881952 CET49768443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:17.381932020 CET4434976834.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:17.381978989 CET49768443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:17.382181883 CET4434976834.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:17.382328033 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:17.382384062 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:17.382734060 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:17.382822037 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:17.382946968 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:17.383002996 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:17.388325930 CET49768443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:17.388325930 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:17.388339996 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:17.498470068 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:17.542540073 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:18.141608000 CET49772443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:18.141635895 CET4434977234.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:18.143832922 CET49772443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:18.145256042 CET49772443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:18.145268917 CET4434977234.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:18.567142010 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:18.572101116 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:18.693640947 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:18.746026039 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:18.752152920 CET4434977234.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:18.752226114 CET49772443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:18.757878065 CET49772443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:18.757884026 CET4434977234.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:18.757997990 CET49772443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:18.758008957 CET4434977234.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:18.758455038 CET49772443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:17:18.957201004 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:18.962213993 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:19.080600977 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:19.084356070 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:19.089195013 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:19.131500959 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:19.210473061 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:19.253731012 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:27.776918888 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:27.776948929 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:27.777264118 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:27.778537989 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:27.778551102 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:28.405452967 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:28.405514956 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:28.410662889 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:28.410667896 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:28.410758972 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:28.410811901 CET4434977334.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:28.410872936 CET49773443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:28.413678885 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:28.419048071 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:28.536855936 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:28.546595097 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:28.551426888 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:28.589059114 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:28.673248053 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:28.720597029 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:30.997391939 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:30.997437954 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.009021997 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.009207964 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.009218931 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.018229008 CET49775443192.168.2.435.190.72.216
                                                                                                                                                                                                Nov 1, 2024 06:17:31.018306971 CET4434977535.190.72.216192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.022159100 CET49775443192.168.2.435.190.72.216
                                                                                                                                                                                                Nov 1, 2024 06:17:31.023519039 CET49775443192.168.2.435.190.72.216
                                                                                                                                                                                                Nov 1, 2024 06:17:31.023552895 CET4434977535.190.72.216192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.032628059 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:31.032650948 CET4434977634.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.033155918 CET49777443192.168.2.4151.101.1.91
                                                                                                                                                                                                Nov 1, 2024 06:17:31.033256054 CET44349777151.101.1.91192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.047163963 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:31.047276020 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:31.047283888 CET49777443192.168.2.4151.101.1.91
                                                                                                                                                                                                Nov 1, 2024 06:17:31.047286987 CET4434977634.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.047445059 CET49777443192.168.2.4151.101.1.91
                                                                                                                                                                                                Nov 1, 2024 06:17:31.047485113 CET44349777151.101.1.91192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.050781012 CET49778443192.168.2.435.201.103.21
                                                                                                                                                                                                Nov 1, 2024 06:17:31.050807953 CET4434977835.201.103.21192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.056931019 CET49778443192.168.2.435.201.103.21
                                                                                                                                                                                                Nov 1, 2024 06:17:31.058298111 CET49778443192.168.2.435.201.103.21
                                                                                                                                                                                                Nov 1, 2024 06:17:31.058314085 CET4434977835.201.103.21192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.608597040 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.608608961 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.608685970 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.611964941 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.611973047 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.612174034 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.614429951 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.614523888 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.614557981 CET4434977435.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.614675999 CET49774443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.618391991 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:31.623270988 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.628416061 CET4434977535.190.72.216192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.628504992 CET49775443192.168.2.435.190.72.216
                                                                                                                                                                                                Nov 1, 2024 06:17:31.632966995 CET49775443192.168.2.435.190.72.216
                                                                                                                                                                                                Nov 1, 2024 06:17:31.632985115 CET4434977535.190.72.216192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.633054018 CET49775443192.168.2.435.190.72.216
                                                                                                                                                                                                Nov 1, 2024 06:17:31.633147955 CET4434977535.190.72.216192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.633424044 CET49775443192.168.2.435.190.72.216
                                                                                                                                                                                                Nov 1, 2024 06:17:31.654480934 CET4434977634.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.654495001 CET4434977634.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.654562950 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:31.657620907 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:31.657628059 CET4434977634.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.657860994 CET4434977634.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.660093069 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:31.660154104 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:31.660212994 CET4434977634.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.661123037 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:31.669605017 CET4434977835.201.103.21192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.671122074 CET49778443192.168.2.435.201.103.21
                                                                                                                                                                                                Nov 1, 2024 06:17:31.674628973 CET49778443192.168.2.435.201.103.21
                                                                                                                                                                                                Nov 1, 2024 06:17:31.674638033 CET4434977835.201.103.21192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.674813032 CET4434977835.201.103.21192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.675560951 CET49778443192.168.2.435.201.103.21
                                                                                                                                                                                                Nov 1, 2024 06:17:31.675568104 CET4434977835.201.103.21192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.676733971 CET49778443192.168.2.435.201.103.21
                                                                                                                                                                                                Nov 1, 2024 06:17:31.685415983 CET44349777151.101.1.91192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.685431957 CET44349777151.101.1.91192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.687124014 CET49777443192.168.2.4151.101.1.91
                                                                                                                                                                                                Nov 1, 2024 06:17:31.689894915 CET49777443192.168.2.4151.101.1.91
                                                                                                                                                                                                Nov 1, 2024 06:17:31.689918995 CET44349777151.101.1.91192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.690215111 CET44349777151.101.1.91192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.691632032 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:31.691653013 CET4434977934.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.691895962 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:31.692318916 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:31.692332983 CET4434977934.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.692593098 CET49777443192.168.2.4151.101.1.91
                                                                                                                                                                                                Nov 1, 2024 06:17:31.692668915 CET49777443192.168.2.4151.101.1.91
                                                                                                                                                                                                Nov 1, 2024 06:17:31.692727089 CET44349777151.101.1.91192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.692804098 CET49777443192.168.2.4151.101.1.91
                                                                                                                                                                                                Nov 1, 2024 06:17:31.699558973 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.699575901 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.699816942 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.699932098 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.699943066 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.701092958 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.701126099 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.701399088 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.701497078 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.701508045 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.702991962 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.702999115 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.703248024 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.703330040 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:31.703337908 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.742546082 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.744625092 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:31.750252962 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.782629967 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:31.871329069 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.914148092 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:32.289160013 CET4434977934.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.289235115 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:32.292347908 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:32.292355061 CET4434977934.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.292560101 CET4434977934.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.294806004 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:32.294909000 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:32.294924974 CET4434977934.149.100.209192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.295068026 CET49779443192.168.2.434.149.100.209
                                                                                                                                                                                                Nov 1, 2024 06:17:32.297698975 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:32.302722931 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.320907116 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.320971966 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.323256969 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.323266029 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.323481083 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.325593948 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.325675011 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.325712919 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.325802088 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.327337980 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.329366922 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.331674099 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.331682920 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.331896067 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.334140062 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.334198952 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.334263086 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.334800005 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.341150999 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.341212988 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.343420029 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.343424082 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.343622923 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.345843077 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.345904112 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.345969915 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.346775055 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                Nov 1, 2024 06:17:32.420989990 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.423772097 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:32.428647041 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.462347984 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:32.559334040 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:32.600523949 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:33.933022976 CET54326443192.168.2.4142.251.116.113
                                                                                                                                                                                                Nov 1, 2024 06:17:33.933048964 CET44354326142.251.116.113192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:33.933415890 CET54326443192.168.2.4142.251.116.113
                                                                                                                                                                                                Nov 1, 2024 06:17:33.933547974 CET54326443192.168.2.4142.251.116.113
                                                                                                                                                                                                Nov 1, 2024 06:17:33.933554888 CET44354326142.251.116.113192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:34.545264006 CET44354326142.251.116.113192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:34.545471907 CET54326443192.168.2.4142.251.116.113
                                                                                                                                                                                                Nov 1, 2024 06:17:34.545897007 CET44354326142.251.116.113192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:34.545958042 CET54326443192.168.2.4142.251.116.113
                                                                                                                                                                                                Nov 1, 2024 06:17:34.548984051 CET54326443192.168.2.4142.251.116.113
                                                                                                                                                                                                Nov 1, 2024 06:17:34.548991919 CET44354326142.251.116.113192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:34.549184084 CET44354326142.251.116.113192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:34.551068068 CET54326443192.168.2.4142.251.116.113
                                                                                                                                                                                                Nov 1, 2024 06:17:34.551168919 CET54326443192.168.2.4142.251.116.113
                                                                                                                                                                                                Nov 1, 2024 06:17:34.551188946 CET44354326142.251.116.113192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:34.551337957 CET54326443192.168.2.4142.251.116.113
                                                                                                                                                                                                Nov 1, 2024 06:17:34.556154966 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:34.561599970 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:34.686616898 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:34.689428091 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:34.694416046 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:34.737935066 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:34.816014051 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:34.860291004 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:44.699121952 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:44.704112053 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:44.830698967 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:44.835665941 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:48.432742119 CET54327443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:48.432760954 CET4435432734.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:48.433243036 CET54327443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:48.434518099 CET54327443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:48.434531927 CET4435432734.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:49.041568995 CET4435432734.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:49.041779995 CET54327443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:49.046947002 CET54327443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:49.046952963 CET4435432734.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:49.047070980 CET54327443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:49.047085047 CET4435432734.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:49.047285080 CET54327443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:17:49.049560070 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:49.054595947 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:49.181497097 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:49.184887886 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:49.189944983 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:49.227350950 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:49.311589956 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:49.358767033 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:59.186439037 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:59.192028046 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:59.317997932 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:17:59.323034048 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.108237028 CET54355443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.108268976 CET4435435534.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.108391047 CET54356443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.108470917 CET4435435634.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.108535051 CET54355443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.108722925 CET54355443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.108735085 CET4435435534.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.108820915 CET54356443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.108959913 CET54356443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.108995914 CET4435435634.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.117089987 CET54359443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.117127895 CET4435435934.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.117614985 CET54359443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.117747068 CET54359443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.117763042 CET4435435934.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.726032019 CET4435435534.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.726200104 CET54355443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.727098942 CET4435435934.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.727230072 CET54359443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.727375031 CET4435435634.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.729309082 CET54355443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.729316950 CET4435435534.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.729542017 CET4435435534.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.731627941 CET54359443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.731640100 CET4435435934.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.731863022 CET4435435934.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.734592915 CET54355443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.734713078 CET4435435534.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.734721899 CET54355443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.734726906 CET4435435534.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.735254049 CET54359443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.735344887 CET54359443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.735399961 CET4435435934.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.737374067 CET54355443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.737391949 CET54359443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.737416029 CET54355443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.737442970 CET54355443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.737452030 CET54356443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.737734079 CET54359443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.741491079 CET54356443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.741529942 CET4435435634.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.741852999 CET4435435634.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.748505116 CET54356443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.748583078 CET54356443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.748689890 CET4435435634.120.208.123192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.749934912 CET54356443192.168.2.434.120.208.123
                                                                                                                                                                                                Nov 1, 2024 06:18:01.767465115 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:01.772349119 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.891436100 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:01.947619915 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:02.021197081 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:02.026097059 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:02.147661924 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:02.198965073 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:05.206073046 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:05.212305069 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:05.331239939 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:05.333750010 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:05.338614941 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:05.392167091 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:05.460257053 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:05.508071899 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:15.334948063 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:15.339761972 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:15.466499090 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:15.471407890 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:25.347971916 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:25.353398085 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:25.479594946 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:25.484415054 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:29.173275948 CET54519443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:18:29.173374891 CET4435451934.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:29.173453093 CET54519443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:18:29.174931049 CET54519443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:18:29.174963951 CET4435451934.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:29.792135954 CET4435451934.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:29.792273998 CET54519443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:18:29.797236919 CET54519443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:18:29.797261953 CET4435451934.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:29.797349930 CET54519443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:18:29.797435999 CET4435451934.107.243.93192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:29.797549009 CET54519443192.168.2.434.107.243.93
                                                                                                                                                                                                Nov 1, 2024 06:18:29.800014973 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:29.804873943 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:29.923275948 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:29.926314116 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:29.931165934 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:29.977031946 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:30.052324057 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:30.092943907 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:39.935878038 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:39.940821886 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:40.067425966 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:40.072371960 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:49.948242903 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:49.953478098 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:50.079788923 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:50.085037947 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:59.972982883 CET4974980192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:18:59.977907896 CET804974934.107.221.82192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:19:00.094681978 CET4975780192.168.2.434.107.221.82
                                                                                                                                                                                                Nov 1, 2024 06:19:00.099590063 CET804975734.107.221.82192.168.2.4
                                                                                                                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                Nov 1, 2024 06:17:02.605493069 CET6274653192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:02.612648964 CET53627461.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:02.613491058 CET5267153192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:02.620798111 CET53526711.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:04.796611071 CET5107753192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:04.797336102 CET6525953192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:04.803247929 CET53510771.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:04.804511070 CET5619753192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:04.805865049 CET5910053192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:04.811009884 CET53561971.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:04.812688112 CET53591001.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:04.820225954 CET5696453192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:04.823365927 CET6272353192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:04.828246117 CET53569641.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:04.830696106 CET53627231.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.039926052 CET5739153192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:05.046829939 CET53573911.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.049942017 CET5906253192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:05.056652069 CET53590621.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.057672977 CET6437753192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:05.058939934 CET6073253192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:05.065001011 CET53643771.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.068758011 CET53607321.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.071254969 CET5079753192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:05.074157000 CET5879653192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:05.078721046 CET53507971.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.081218958 CET53587961.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.093231916 CET6104753192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:05.093435049 CET5846853192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:05.099822998 CET53610471.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.100828886 CET53584681.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.464545965 CET5578253192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:05.465063095 CET5972253192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:05.471366882 CET53557821.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.472117901 CET53597221.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.596354961 CET5740753192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:05.596935034 CET6230453192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:05.604116917 CET53574071.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.605732918 CET5641753192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:05.612363100 CET53564171.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:05.613068104 CET5254653192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:05.619821072 CET53525461.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.459558010 CET5791353192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:07.482060909 CET53522531.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:07.991463900 CET5038053192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:07.998555899 CET53503801.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.037754059 CET5376753192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:08.044356108 CET53537671.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.048137903 CET4953953192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:08.055037975 CET53495391.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.366482019 CET6372753192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:08.373517036 CET53637271.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.405777931 CET5555853192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:08.412832975 CET53555581.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.419599056 CET5334753192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:08.426598072 CET53533471.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.917942047 CET5184253192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:08.925271988 CET53518421.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.926006079 CET5245353192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:08.933959007 CET53524531.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:08.934463024 CET5046953192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:08.942676067 CET53504691.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.682518005 CET5153653192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:09.690069914 CET53515361.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:09.734406948 CET5293453192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:09.741357088 CET53529341.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.469460964 CET6388353192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.477504015 CET53638831.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.840996981 CET5540353192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.841243982 CET5773653192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.841721058 CET5958353192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863691092 CET53577361.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET53554031.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.864144087 CET53595831.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.864263058 CET6232653192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.864686966 CET6353953192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.865175962 CET6145253192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871644020 CET53623261.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET53635391.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871699095 CET53614521.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.873155117 CET5519853192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.873478889 CET5560953192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.874207020 CET6436453192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.880462885 CET53551981.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.880979061 CET53556091.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.881432056 CET53643641.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.884093046 CET4950453192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.892445087 CET53495041.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.895052910 CET6482253192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.895157099 CET4931453192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.895667076 CET5805053192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.901911974 CET53648221.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.902410984 CET53493141.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.902653933 CET5937753192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.902725935 CET53580501.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.903045893 CET5664153192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.909348011 CET53593771.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.910438061 CET53566411.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:15.931600094 CET5674753192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:15.938136101 CET53567471.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:27.777229071 CET6005153192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:27.785502911 CET53600511.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:28.413867950 CET6325553192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:31.003433943 CET6249053192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:31.012108088 CET53624901.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.018367052 CET5737953192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:31.018887997 CET6352953192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:31.026141882 CET53573791.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.026824951 CET53635291.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.042010069 CET5571953192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:31.050542116 CET53557191.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.050944090 CET5133253192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:31.058078051 CET53513321.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.059204102 CET5491453192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:31.059772015 CET6102953192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:31.066741943 CET53549141.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:31.067097902 CET53610291.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:33.325139999 CET53635321.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:48.432178020 CET6328953192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:48.438816071 CET53632891.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:48.439898968 CET5826753192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:17:48.446717978 CET53582671.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:17:49.049835920 CET5587953192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:18:01.099944115 CET5747653192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:18:01.106725931 CET53574761.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:29.165334940 CET5095553192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:18:29.172099113 CET53509551.1.1.1192.168.2.4
                                                                                                                                                                                                Nov 1, 2024 06:18:29.172689915 CET5714753192.168.2.41.1.1.1
                                                                                                                                                                                                Nov 1, 2024 06:18:29.181374073 CET53571471.1.1.1192.168.2.4
                                                                                                                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                Nov 1, 2024 06:17:02.605493069 CET192.168.2.41.1.1.10xfc49Standard query (0)prod.classify-client.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:02.613491058 CET192.168.2.41.1.1.10x339Standard query (0)prod.classify-client.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:04.796611071 CET192.168.2.41.1.1.10x71f2Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:04.797336102 CET192.168.2.41.1.1.10x5e88Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:04.804511070 CET192.168.2.41.1.1.10x820aStandard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:04.805865049 CET192.168.2.41.1.1.10x2bf6Standard query (0)prod.detectportal.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:04.820225954 CET192.168.2.41.1.1.10xfafdStandard query (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:04.823365927 CET192.168.2.41.1.1.10x7e14Standard query (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.039926052 CET192.168.2.41.1.1.10x9bdcStandard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.049942017 CET192.168.2.41.1.1.10x2bc0Standard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.057672977 CET192.168.2.41.1.1.10xb67bStandard query (0)spocs.getpocket.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.058939934 CET192.168.2.41.1.1.10xcb60Standard query (0)contile.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.071254969 CET192.168.2.41.1.1.10xee73Standard query (0)prod.ads.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.074157000 CET192.168.2.41.1.1.10x63d0Standard query (0)prod.balrog.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.093231916 CET192.168.2.41.1.1.10x8316Standard query (0)prod.ads.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.093435049 CET192.168.2.41.1.1.10x4028Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.464545965 CET192.168.2.41.1.1.10xfe01Standard query (0)example.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.465063095 CET192.168.2.41.1.1.10xa51eStandard query (0)ipv4only.arpaA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.596354961 CET192.168.2.41.1.1.10x4b88Standard query (0)content-signature-2.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.596935034 CET192.168.2.41.1.1.10x136fStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.605732918 CET192.168.2.41.1.1.10x6e46Standard query (0)prod.content-signature-chains.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.613068104 CET192.168.2.41.1.1.10x7c3aStandard query (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:07.459558010 CET192.168.2.41.1.1.10x3990Standard query (0)shavar.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:07.991463900 CET192.168.2.41.1.1.10xb9a2Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.037754059 CET192.168.2.41.1.1.10x953Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.048137903 CET192.168.2.41.1.1.10xc981Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.366482019 CET192.168.2.41.1.1.10xb957Standard query (0)firefox.settings.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.405777931 CET192.168.2.41.1.1.10x9e33Standard query (0)prod.remote-settings.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.419599056 CET192.168.2.41.1.1.10x800cStandard query (0)prod.remote-settings.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.917942047 CET192.168.2.41.1.1.10x8abcStandard query (0)support.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.926006079 CET192.168.2.41.1.1.10x5634Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.934463024 CET192.168.2.41.1.1.10x741Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:09.682518005 CET192.168.2.41.1.1.10xff3cStandard query (0)telemetry-incoming.r53-2.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:09.734406948 CET192.168.2.41.1.1.10x4593Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.469460964 CET192.168.2.41.1.1.10xf50fStandard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.840996981 CET192.168.2.41.1.1.10xb9c9Standard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.841243982 CET192.168.2.41.1.1.10x88f1Standard query (0)www.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.841721058 CET192.168.2.41.1.1.10x5e1bStandard query (0)www.wikipedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.864263058 CET192.168.2.41.1.1.10xbabcStandard query (0)star-mini.c10r.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.864686966 CET192.168.2.41.1.1.10x6f53Standard query (0)youtube-ui.l.google.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.865175962 CET192.168.2.41.1.1.10x2502Standard query (0)dyna.wikimedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.873155117 CET192.168.2.41.1.1.10xbaf4Standard query (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.873478889 CET192.168.2.41.1.1.10xc6bcStandard query (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.874207020 CET192.168.2.41.1.1.10xea9eStandard query (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.884093046 CET192.168.2.41.1.1.10x7f36Standard query (0)www.reddit.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.895052910 CET192.168.2.41.1.1.10x29e6Standard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.895157099 CET192.168.2.41.1.1.10xc1a5Standard query (0)reddit.map.fastly.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.895667076 CET192.168.2.41.1.1.10x671fStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.902653933 CET192.168.2.41.1.1.10x4256Standard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.903045893 CET192.168.2.41.1.1.10x29f0Standard query (0)reddit.map.fastly.net28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.931600094 CET192.168.2.41.1.1.10xb38bStandard query (0)twitter.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:27.777229071 CET192.168.2.41.1.1.10x8da4Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:28.413867950 CET192.168.2.41.1.1.10x1979Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.003433943 CET192.168.2.41.1.1.10x5ff9Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.018367052 CET192.168.2.41.1.1.10x7f78Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.018887997 CET192.168.2.41.1.1.10x180fStandard query (0)normandy.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.042010069 CET192.168.2.41.1.1.10xff55Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.050944090 CET192.168.2.41.1.1.10x5db2Standard query (0)normandy-cdn.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.059204102 CET192.168.2.41.1.1.10x128bStandard query (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.059772015 CET192.168.2.41.1.1.10xb3edStandard query (0)normandy-cdn.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:48.432178020 CET192.168.2.41.1.1.10xa60bStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:48.439898968 CET192.168.2.41.1.1.10xc4d7Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:49.049835920 CET192.168.2.41.1.1.10xc130Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:18:01.099944115 CET192.168.2.41.1.1.10x9ef3Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:18:29.165334940 CET192.168.2.41.1.1.10xb3c6Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:18:29.172689915 CET192.168.2.41.1.1.10xdf1aStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                Nov 1, 2024 06:17:02.602081060 CET1.1.1.1192.168.2.40x6809No error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:02.612648964 CET1.1.1.1192.168.2.40xfc49No error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:04.803247929 CET1.1.1.1192.168.2.40x71f2No error (0)youtube.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:04.804032087 CET1.1.1.1192.168.2.40x5e88No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:04.804032087 CET1.1.1.1192.168.2.40x5e88No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:04.811009884 CET1.1.1.1192.168.2.40x820aNo error (0)youtube.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:04.812688112 CET1.1.1.1192.168.2.40x2bf6No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:04.828246117 CET1.1.1.1192.168.2.40xfafdNo error (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:04.830696106 CET1.1.1.1192.168.2.40x7e14No error (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.046829939 CET1.1.1.1192.168.2.40x9bdcNo error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.056652069 CET1.1.1.1192.168.2.40x2bc0No error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.064886093 CET1.1.1.1192.168.2.40xb17aNo error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.064886093 CET1.1.1.1192.168.2.40xb17aNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.065001011 CET1.1.1.1192.168.2.40xb67bNo error (0)spocs.getpocket.comprod.ads.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.065001011 CET1.1.1.1192.168.2.40xb67bNo error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.078721046 CET1.1.1.1192.168.2.40xee73No error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.081218958 CET1.1.1.1192.168.2.40x63d0No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.471366882 CET1.1.1.1192.168.2.40xfe01No error (0)example.org93.184.215.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.472117901 CET1.1.1.1192.168.2.40xa51eNo error (0)ipv4only.arpa192.0.0.170A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.472117901 CET1.1.1.1192.168.2.40xa51eNo error (0)ipv4only.arpa192.0.0.171A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.604116917 CET1.1.1.1192.168.2.40x4b88No error (0)content-signature-2.cdn.mozilla.netcontent-signature-chains.prod.autograph.services.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.604116917 CET1.1.1.1192.168.2.40x4b88No error (0)content-signature-chains.prod.autograph.services.mozaws.netprod.content-signature-chains.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.604116917 CET1.1.1.1192.168.2.40x4b88No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.604264021 CET1.1.1.1192.168.2.40x136fNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.604264021 CET1.1.1.1192.168.2.40x136fNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.612363100 CET1.1.1.1192.168.2.40x6e46No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:05.619821072 CET1.1.1.1192.168.2.40x7c3aNo error (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:07.466610909 CET1.1.1.1192.168.2.40x3990No error (0)shavar.services.mozilla.comshavar.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:07.998555899 CET1.1.1.1192.168.2.40xb9a2No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.044356108 CET1.1.1.1192.168.2.40x953No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.365528107 CET1.1.1.1192.168.2.40x2e44No error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.365528107 CET1.1.1.1192.168.2.40x2e44No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.373517036 CET1.1.1.1192.168.2.40xb957No error (0)firefox.settings.services.mozilla.comprod.remote-settings.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.373517036 CET1.1.1.1192.168.2.40xb957No error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.412832975 CET1.1.1.1192.168.2.40x9e33No error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.925271988 CET1.1.1.1192.168.2.40x8abcNo error (0)support.mozilla.orgprod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.925271988 CET1.1.1.1192.168.2.40x8abcNo error (0)prod.sumo.prod.webservices.mozgcp.netus-west1.prod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.925271988 CET1.1.1.1192.168.2.40x8abcNo error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:08.933959007 CET1.1.1.1192.168.2.40x5634No error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:09.650804043 CET1.1.1.1192.168.2.40x5d06No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:09.690069914 CET1.1.1.1192.168.2.40xff3cNo error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.475989103 CET1.1.1.1192.168.2.40x3725No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863691092 CET1.1.1.1192.168.2.40x88f1No error (0)www.facebook.comstar-mini.c10r.facebook.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863691092 CET1.1.1.1192.168.2.40x88f1No error (0)star-mini.c10r.facebook.com157.240.253.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com172.217.23.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.863758087 CET1.1.1.1192.168.2.40xb9c9No error (0)youtube-ui.l.google.com142.250.74.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.864144087 CET1.1.1.1192.168.2.40x5e1bNo error (0)www.wikipedia.orgdyna.wikimedia.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.864144087 CET1.1.1.1192.168.2.40x5e1bNo error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871644020 CET1.1.1.1192.168.2.40xbabcNo error (0)star-mini.c10r.facebook.com157.240.252.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com172.217.18.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871655941 CET1.1.1.1192.168.2.40x6f53No error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.871699095 CET1.1.1.1192.168.2.40x2502No error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.880462885 CET1.1.1.1192.168.2.40xbaf4No error (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.880979061 CET1.1.1.1192.168.2.40xc6bcNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.880979061 CET1.1.1.1192.168.2.40xc6bcNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.880979061 CET1.1.1.1192.168.2.40xc6bcNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.880979061 CET1.1.1.1192.168.2.40xc6bcNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.881432056 CET1.1.1.1192.168.2.40xea9eNo error (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.892445087 CET1.1.1.1192.168.2.40x7f36No error (0)www.reddit.comreddit.map.fastly.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.892445087 CET1.1.1.1192.168.2.40x7f36No error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.892445087 CET1.1.1.1192.168.2.40x7f36No error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.892445087 CET1.1.1.1192.168.2.40x7f36No error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.892445087 CET1.1.1.1192.168.2.40x7f36No error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.901911974 CET1.1.1.1192.168.2.40x29e6No error (0)twitter.com104.244.42.1A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.902410984 CET1.1.1.1192.168.2.40xc1a5No error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.902410984 CET1.1.1.1192.168.2.40xc1a5No error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.902410984 CET1.1.1.1192.168.2.40xc1a5No error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.902410984 CET1.1.1.1192.168.2.40xc1a5No error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:15.909348011 CET1.1.1.1192.168.2.40x4256No error (0)twitter.com104.244.42.1A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:28.421413898 CET1.1.1.1192.168.2.40x1979No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:28.421413898 CET1.1.1.1192.168.2.40x1979No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.026141882 CET1.1.1.1192.168.2.40x7f78No error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.026141882 CET1.1.1.1192.168.2.40x7f78No error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.026141882 CET1.1.1.1192.168.2.40x7f78No error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.026141882 CET1.1.1.1192.168.2.40x7f78No error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.026824951 CET1.1.1.1192.168.2.40x180fNo error (0)normandy.cdn.mozilla.netnormandy-cdn.services.mozilla.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.026824951 CET1.1.1.1192.168.2.40x180fNo error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.050542116 CET1.1.1.1192.168.2.40xff55No error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.050542116 CET1.1.1.1192.168.2.40xff55No error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.050542116 CET1.1.1.1192.168.2.40xff55No error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.050542116 CET1.1.1.1192.168.2.40xff55No error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.058078051 CET1.1.1.1192.168.2.40x5db2No error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.066741943 CET1.1.1.1192.168.2.40x128bNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.066741943 CET1.1.1.1192.168.2.40x128bNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.066741943 CET1.1.1.1192.168.2.40x128bNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:31.066741943 CET1.1.1.1192.168.2.40x128bNo error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:32.345699072 CET1.1.1.1192.168.2.40x3db3No error (0)a21ed24aedde648804e7-228765c84088fef4ff5e70f2710398e9.r17.cf1.rackcdn.coma17.rackcdn.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:32.345699072 CET1.1.1.1192.168.2.40x3db3No error (0)a17.rackcdn.coma17.rackcdn.com.mdc.edgesuite.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:48.438816071 CET1.1.1.1192.168.2.40xa60bNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:49.056632996 CET1.1.1.1192.168.2.40xc130No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:17:49.056632996 CET1.1.1.1192.168.2.40xc130No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:18:01.091808081 CET1.1.1.1192.168.2.40xdcb7No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                Nov 1, 2024 06:18:29.172099113 CET1.1.1.1192.168.2.40xb3c6No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                • detectportal.firefox.com
                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                0192.168.2.44974034.107.221.82807900C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                Nov 1, 2024 06:17:04.853058100 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:17:05.449779987 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72666
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                1192.168.2.44974634.107.221.82807900C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                Nov 1, 2024 06:17:05.610383034 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:17:06.212732077 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49661
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success


                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                2192.168.2.44974934.107.221.82807900C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                Nov 1, 2024 06:17:05.755143881 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:17:06.347786903 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72667
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:17:06.521742105 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:17:06.644666910 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72667
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:17:07.702785969 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:17:07.826438904 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72668
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:17:08.476479053 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:17:08.599112034 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72669
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:17:09.740019083 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:17:09.865159988 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72670
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:17:14.640769005 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:17:14.763698101 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72675
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:17:17.374849081 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:17:17.498470068 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72678
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:17:18.957201004 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:17:19.080600977 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72680
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:17:28.413678885 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:17:28.536855936 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72689
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:17:31.618391991 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:17:31.742546082 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72692
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:17:32.297698975 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:17:32.420989990 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72693
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:17:34.556154966 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:17:34.686616898 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72695
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:17:44.699121952 CET6OUTData Raw: 00
                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                Nov 1, 2024 06:17:49.049560070 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:17:49.181497097 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72710
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:17:59.186439037 CET6OUTData Raw: 00
                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                Nov 1, 2024 06:18:01.767465115 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:18:01.891436100 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72722
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:18:05.206073046 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:18:05.331239939 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72726
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:18:15.334948063 CET6OUTData Raw: 00
                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                Nov 1, 2024 06:18:25.347971916 CET6OUTData Raw: 00
                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                Nov 1, 2024 06:18:29.800014973 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Nov 1, 2024 06:18:29.923275948 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 90
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 09:05:59 GMT
                                                                                                                                                                                                Age: 72750
                                                                                                                                                                                                Content-Type: text/html
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                Nov 1, 2024 06:18:39.935878038 CET6OUTData Raw: 00
                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                Nov 1, 2024 06:18:49.948242903 CET6OUTData Raw: 00
                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                Nov 1, 2024 06:18:59.972982883 CET6OUTData Raw: 00
                                                                                                                                                                                                Data Ascii:


                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                3192.168.2.44975234.107.221.82807900C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                Nov 1, 2024 06:17:06.532617092 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache


                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                4192.168.2.44975534.107.221.82807900C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                Nov 1, 2024 06:17:07.459558964 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache


                                                                                                                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                5192.168.2.44975734.107.221.82807900C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                TimestampBytes transferredDirectionData
                                                                                                                                                                                                Nov 1, 2024 06:17:07.990710974 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:17:08.596198082 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49663
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                Nov 1, 2024 06:17:08.687648058 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:17:08.813884974 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49663
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                Nov 1, 2024 06:17:14.118647099 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:17:14.266032934 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49669
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                Nov 1, 2024 06:17:15.839562893 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:17:15.966727018 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49670
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                Nov 1, 2024 06:17:18.567142010 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:17:18.693640947 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49673
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                Nov 1, 2024 06:17:19.084356070 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:17:19.210473061 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49674
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                Nov 1, 2024 06:17:28.546595097 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:17:28.673248053 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49683
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                Nov 1, 2024 06:17:31.744625092 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:17:31.871329069 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49686
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                Nov 1, 2024 06:17:32.423772097 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:17:32.559334040 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49687
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                Nov 1, 2024 06:17:34.689428091 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:17:34.816014051 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49689
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                Nov 1, 2024 06:17:44.830698967 CET6OUTData Raw: 00
                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                Nov 1, 2024 06:17:49.184887886 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:17:49.311589956 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49704
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                Nov 1, 2024 06:17:59.317997932 CET6OUTData Raw: 00
                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                Nov 1, 2024 06:18:02.021197081 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:18:02.147661924 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49717
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                Nov 1, 2024 06:18:05.333750010 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:18:05.460257053 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49720
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                Nov 1, 2024 06:18:15.466499090 CET6OUTData Raw: 00
                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                Nov 1, 2024 06:18:25.479594946 CET6OUTData Raw: 00
                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                Nov 1, 2024 06:18:29.926314116 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                Host: detectportal.firefox.com
                                                                                                                                                                                                User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                Accept: */*
                                                                                                                                                                                                Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                Accept-Encoding: gzip, deflate
                                                                                                                                                                                                Connection: keep-alive
                                                                                                                                                                                                Pragma: no-cache
                                                                                                                                                                                                Cache-Control: no-cache
                                                                                                                                                                                                Nov 1, 2024 06:18:30.052324057 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                Server: nginx
                                                                                                                                                                                                Content-Length: 8
                                                                                                                                                                                                Via: 1.1 google
                                                                                                                                                                                                Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                Age: 49744
                                                                                                                                                                                                Content-Type: text/plain
                                                                                                                                                                                                Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                Data Ascii: success
                                                                                                                                                                                                Nov 1, 2024 06:18:40.067425966 CET6OUTData Raw: 00
                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                Nov 1, 2024 06:18:50.079788923 CET6OUTData Raw: 00
                                                                                                                                                                                                Data Ascii:
                                                                                                                                                                                                Nov 1, 2024 06:19:00.094681978 CET6OUTData Raw: 00
                                                                                                                                                                                                Data Ascii:


                                                                                                                                                                                                Click to jump to process

                                                                                                                                                                                                Click to jump to process

                                                                                                                                                                                                Click to dive into process behavior distribution

                                                                                                                                                                                                Click to jump to process

                                                                                                                                                                                                Target ID:0
                                                                                                                                                                                                Start time:01:16:55
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                                                                                                                Imagebase:0xed0000
                                                                                                                                                                                                File size:919'552 bytes
                                                                                                                                                                                                MD5 hash:AB9A5055A57BF0CE6EB64D81699F6AC1
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Yara matches:
                                                                                                                                                                                                • Rule: JoeSecurity_CredentialFlusher, Description: Yara detected Credential Flusher, Source: 00000000.00000003.1721960630.00000000015CF000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                • Rule: JoeSecurity_CredentialFlusher, Description: Yara detected Credential Flusher, Source: 00000000.00000003.1722006831.00000000015D6000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                Reputation:low
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:1
                                                                                                                                                                                                Start time:01:16:55
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:taskkill /F /IM firefox.exe /T
                                                                                                                                                                                                Imagebase:0x860000
                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:2
                                                                                                                                                                                                Start time:01:16:55
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:3
                                                                                                                                                                                                Start time:01:16:58
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:taskkill /F /IM chrome.exe /T
                                                                                                                                                                                                Imagebase:0x860000
                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:4
                                                                                                                                                                                                Start time:01:16:58
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:5
                                                                                                                                                                                                Start time:01:16:58
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:taskkill /F /IM msedge.exe /T
                                                                                                                                                                                                Imagebase:0x860000
                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:6
                                                                                                                                                                                                Start time:01:16:58
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:7
                                                                                                                                                                                                Start time:01:16:58
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:taskkill /F /IM opera.exe /T
                                                                                                                                                                                                Imagebase:0x860000
                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:8
                                                                                                                                                                                                Start time:01:16:58
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:9
                                                                                                                                                                                                Start time:01:16:58
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                Wow64 process (32bit):true
                                                                                                                                                                                                Commandline:taskkill /F /IM brave.exe /T
                                                                                                                                                                                                Imagebase:0x860000
                                                                                                                                                                                                File size:74'240 bytes
                                                                                                                                                                                                MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:10
                                                                                                                                                                                                Start time:01:16:58
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                Imagebase:0x7ff7699e0000
                                                                                                                                                                                                File size:862'208 bytes
                                                                                                                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Reputation:high
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:11
                                                                                                                                                                                                Start time:01:16:58
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                Has elevated privileges:true
                                                                                                                                                                                                Has administrator privileges:true
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:12
                                                                                                                                                                                                Start time:01:16:58
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:true

                                                                                                                                                                                                Target ID:13
                                                                                                                                                                                                Start time:01:16:58
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:15
                                                                                                                                                                                                Start time:01:16:59
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2300 -parentBuildID 20230927232528 -prefsHandle 2248 -prefMapHandle 2240 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {681be74a-1bb9-45bf-a064-2568e5603787} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197a056d310 socket
                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:16
                                                                                                                                                                                                Start time:01:17:02
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=3936 -parentBuildID 20230927232528 -prefsHandle 3904 -prefMapHandle 3892 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {8548365d-f205-4391-ba44-a87f283ec693} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197b276a710 rdd
                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Target ID:17
                                                                                                                                                                                                Start time:01:17:07
                                                                                                                                                                                                Start date:01/11/2024
                                                                                                                                                                                                Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                Wow64 process (32bit):false
                                                                                                                                                                                                Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5124 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 4732 -prefMapHandle 5108 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {1499095d-2804-4cb1-b508-9ad3baa802c6} 7900 "\\.\pipe\gecko-crash-server-pipe.7900" 197a0574f10 utility
                                                                                                                                                                                                Imagebase:0x7ff6bf500000
                                                                                                                                                                                                File size:676'768 bytes
                                                                                                                                                                                                MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                Has elevated privileges:false
                                                                                                                                                                                                Has administrator privileges:false
                                                                                                                                                                                                Programmed in:C, C++ or other language
                                                                                                                                                                                                Has exited:false

                                                                                                                                                                                                Reset < >

                                                                                                                                                                                                  Execution Graph

                                                                                                                                                                                                  Execution Coverage:2%
                                                                                                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                  Signature Coverage:4.4%
                                                                                                                                                                                                  Total number of Nodes:1548
                                                                                                                                                                                                  Total number of Limit Nodes:65
                                                                                                                                                                                                  execution_graph 95057 ed1cad SystemParametersInfoW 95058 f62a55 95066 f41ebc 95058->95066 95061 f62a70 95068 f339c0 22 API calls 95061->95068 95062 f62a87 95064 f62a7c 95069 f3417d 22 API calls __fread_nolock 95064->95069 95067 f41ec3 IsWindow 95066->95067 95067->95061 95067->95062 95068->95064 95069->95062 95070 f23f75 95081 eeceb1 95070->95081 95072 f23f8b 95074 f24006 95072->95074 95148 eee300 23 API calls 95072->95148 95090 edbf40 95074->95090 95076 f24052 95079 f24a88 95076->95079 95150 f4359c 82 API calls __wsopen_s 95076->95150 95078 f23fe6 95078->95076 95149 f41abf 22 API calls 95078->95149 95082 eecebf 95081->95082 95083 eeced2 95081->95083 95151 edaceb 95082->95151 95085 eeced7 95083->95085 95086 eecf05 95083->95086 95161 eefddb 95085->95161 95088 edaceb 23 API calls 95086->95088 95089 eecec9 95088->95089 95089->95072 95185 edadf0 95090->95185 95092 edbf9d 95093 f204b6 95092->95093 95094 edbfa9 95092->95094 95213 f4359c 82 API calls __wsopen_s 95093->95213 95096 edc01e 95094->95096 95097 f204c6 95094->95097 95190 edac91 95096->95190 95214 f4359c 82 API calls __wsopen_s 95097->95214 95100 edc7da 95202 eefe0b 95100->95202 95106 f204f5 95109 f2055a 95106->95109 95215 eed217 348 API calls 95106->95215 95133 edc603 95109->95133 95216 f4359c 82 API calls __wsopen_s 95109->95216 95110 eefe0b 22 API calls 95144 edc350 __fread_nolock messages 95110->95144 95111 edaf8a 22 API calls 95145 edc039 __fread_nolock messages 95111->95145 95112 f37120 22 API calls 95112->95145 95113 edc808 __fread_nolock 95113->95110 95114 f2091a 95249 f43209 23 API calls 95114->95249 95115 eefddb 22 API calls 95115->95145 95118 edec40 348 API calls 95118->95145 95119 f208a5 95223 edec40 95119->95223 95122 f208cf 95122->95133 95247 eda81b 41 API calls 95122->95247 95123 f20591 95217 f4359c 82 API calls __wsopen_s 95123->95217 95124 f208f6 95248 f4359c 82 API calls __wsopen_s 95124->95248 95129 edbbe0 40 API calls 95129->95145 95130 edaceb 23 API calls 95130->95145 95131 edc237 95132 edc253 95131->95132 95250 eda8c7 22 API calls __fread_nolock 95131->95250 95135 f20976 95132->95135 95140 edc297 messages 95132->95140 95133->95076 95137 edaceb 23 API calls 95135->95137 95138 f209bf 95137->95138 95138->95133 95251 f4359c 82 API calls __wsopen_s 95138->95251 95139 edaceb 23 API calls 95141 edc335 95139->95141 95140->95138 95140->95139 95141->95138 95142 edc342 95141->95142 95201 eda704 22 API calls messages 95142->95201 95147 edc3ac 95144->95147 95212 eece17 22 API calls messages 95144->95212 95145->95100 95145->95106 95145->95109 95145->95111 95145->95112 95145->95113 95145->95114 95145->95115 95145->95118 95145->95119 95145->95123 95145->95124 95145->95129 95145->95130 95145->95131 95145->95133 95145->95138 95146 eefe0b 22 API calls 95145->95146 95194 edad81 95145->95194 95218 f37099 22 API calls __fread_nolock 95145->95218 95219 f55745 54 API calls _wcslen 95145->95219 95220 eeaa42 22 API calls messages 95145->95220 95221 f3f05c 40 API calls 95145->95221 95222 eda993 41 API calls 95145->95222 95146->95145 95147->95076 95148->95078 95149->95074 95150->95079 95152 edacf9 95151->95152 95160 edad2a messages 95151->95160 95153 edad01 messages 95152->95153 95154 edad55 95152->95154 95156 f1fa48 95153->95156 95157 edad21 95153->95157 95153->95160 95154->95160 95171 eda8c7 22 API calls __fread_nolock 95154->95171 95156->95160 95172 eece17 22 API calls messages 95156->95172 95158 f1fa3a VariantClear 95157->95158 95157->95160 95158->95160 95160->95089 95164 eefde0 95161->95164 95163 eefdfa 95163->95089 95164->95163 95166 eefdfc 95164->95166 95173 efea0c 95164->95173 95180 ef4ead 7 API calls 2 library calls 95164->95180 95170 ef066d 95166->95170 95181 ef32a4 RaiseException 95166->95181 95169 ef068a 95169->95089 95182 ef32a4 RaiseException 95170->95182 95171->95160 95172->95160 95178 f03820 _abort 95173->95178 95174 f0385e 95184 eff2d9 20 API calls _abort 95174->95184 95175 f03849 RtlAllocateHeap 95177 f0385c 95175->95177 95175->95178 95177->95164 95178->95174 95178->95175 95183 ef4ead 7 API calls 2 library calls 95178->95183 95180->95164 95181->95170 95182->95169 95183->95178 95184->95177 95186 edae01 95185->95186 95189 edae1c messages 95185->95189 95252 edaec9 95186->95252 95188 edae09 CharUpperBuffW 95188->95189 95189->95092 95191 edacae 95190->95191 95192 edacd1 95191->95192 95258 f4359c 82 API calls __wsopen_s 95191->95258 95192->95145 95195 f1fadb 95194->95195 95196 edad92 95194->95196 95197 eefddb 22 API calls 95196->95197 95198 edad99 95197->95198 95259 edadcd 95198->95259 95201->95144 95205 eefddb 95202->95205 95203 efea0c ___std_exception_copy 21 API calls 95203->95205 95204 eefdfa 95204->95113 95205->95203 95205->95204 95208 eefdfc 95205->95208 95272 ef4ead 7 API calls 2 library calls 95205->95272 95207 ef066d 95274 ef32a4 RaiseException 95207->95274 95208->95207 95273 ef32a4 RaiseException 95208->95273 95211 ef068a 95211->95113 95212->95144 95213->95097 95214->95133 95215->95109 95216->95133 95217->95133 95218->95145 95219->95145 95220->95145 95221->95145 95222->95145 95243 edec76 messages 95223->95243 95224 ef0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 95224->95243 95225 ef00a3 29 API calls pre_c_initialization 95225->95243 95226 eefddb 22 API calls 95226->95243 95227 edfef7 95240 eded9d messages 95227->95240 95278 eda8c7 22 API calls __fread_nolock 95227->95278 95230 f24b0b 95280 f4359c 82 API calls __wsopen_s 95230->95280 95231 f24600 95231->95240 95277 eda8c7 22 API calls __fread_nolock 95231->95277 95235 eda8c7 22 API calls 95235->95243 95238 edfbe3 95238->95240 95241 f24bdc 95238->95241 95246 edf3ae messages 95238->95246 95239 eda961 22 API calls 95239->95243 95240->95122 95281 f4359c 82 API calls __wsopen_s 95241->95281 95243->95224 95243->95225 95243->95226 95243->95227 95243->95230 95243->95231 95243->95235 95243->95238 95243->95239 95243->95240 95244 ef01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 95243->95244 95245 f24beb 95243->95245 95243->95246 95275 ee01e0 348 API calls 2 library calls 95243->95275 95276 ee06a0 41 API calls messages 95243->95276 95244->95243 95282 f4359c 82 API calls __wsopen_s 95245->95282 95246->95240 95279 f4359c 82 API calls __wsopen_s 95246->95279 95247->95124 95248->95133 95249->95131 95250->95132 95251->95133 95253 edaedc 95252->95253 95254 edaed9 __fread_nolock 95252->95254 95255 eefddb 22 API calls 95253->95255 95254->95188 95256 edaee7 95255->95256 95257 eefe0b 22 API calls 95256->95257 95257->95254 95258->95192 95263 edaddd 95259->95263 95260 edadb6 95260->95145 95261 eefddb 22 API calls 95261->95263 95263->95260 95263->95261 95265 edadcd 22 API calls 95263->95265 95266 eda961 95263->95266 95271 eda8c7 22 API calls __fread_nolock 95263->95271 95265->95263 95267 eefe0b 22 API calls 95266->95267 95268 eda976 95267->95268 95269 eefddb 22 API calls 95268->95269 95270 eda984 95269->95270 95270->95263 95271->95263 95272->95205 95273->95207 95274->95211 95275->95243 95276->95243 95277->95240 95278->95240 95279->95240 95280->95240 95281->95245 95282->95240 95283 ed1044 95288 ed10f3 95283->95288 95285 ed104a 95324 ef00a3 29 API calls __onexit 95285->95324 95287 ed1054 95325 ed1398 95288->95325 95292 ed116a 95293 eda961 22 API calls 95292->95293 95294 ed1174 95293->95294 95295 eda961 22 API calls 95294->95295 95296 ed117e 95295->95296 95297 eda961 22 API calls 95296->95297 95298 ed1188 95297->95298 95299 eda961 22 API calls 95298->95299 95300 ed11c6 95299->95300 95301 eda961 22 API calls 95300->95301 95302 ed1292 95301->95302 95335 ed171c 95302->95335 95306 ed12c4 95307 eda961 22 API calls 95306->95307 95308 ed12ce 95307->95308 95356 ee1940 95308->95356 95310 ed12f9 95366 ed1aab 95310->95366 95312 ed1315 95313 ed1325 GetStdHandle 95312->95313 95314 f12485 95313->95314 95315 ed137a 95313->95315 95314->95315 95316 f1248e 95314->95316 95318 ed1387 OleInitialize 95315->95318 95317 eefddb 22 API calls 95316->95317 95319 f12495 95317->95319 95318->95285 95373 f4011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 95319->95373 95321 f1249e 95374 f40944 CreateThread 95321->95374 95323 f124aa CloseHandle 95323->95315 95324->95287 95375 ed13f1 95325->95375 95328 ed13f1 22 API calls 95329 ed13d0 95328->95329 95330 eda961 22 API calls 95329->95330 95331 ed13dc 95330->95331 95382 ed6b57 95331->95382 95333 ed1129 95334 ed1bc3 6 API calls 95333->95334 95334->95292 95336 eda961 22 API calls 95335->95336 95337 ed172c 95336->95337 95338 eda961 22 API calls 95337->95338 95339 ed1734 95338->95339 95340 eda961 22 API calls 95339->95340 95341 ed174f 95340->95341 95342 eefddb 22 API calls 95341->95342 95343 ed129c 95342->95343 95344 ed1b4a 95343->95344 95345 ed1b58 95344->95345 95346 eda961 22 API calls 95345->95346 95347 ed1b63 95346->95347 95348 eda961 22 API calls 95347->95348 95349 ed1b6e 95348->95349 95350 eda961 22 API calls 95349->95350 95351 ed1b79 95350->95351 95352 eda961 22 API calls 95351->95352 95353 ed1b84 95352->95353 95354 eefddb 22 API calls 95353->95354 95355 ed1b96 RegisterWindowMessageW 95354->95355 95355->95306 95357 ee1981 95356->95357 95360 ee195d 95356->95360 95399 ef0242 5 API calls __Init_thread_wait 95357->95399 95359 ee196e 95359->95310 95360->95359 95401 ef0242 5 API calls __Init_thread_wait 95360->95401 95361 ee198b 95361->95360 95400 ef01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95361->95400 95363 ee8727 95363->95359 95402 ef01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95363->95402 95367 ed1abb 95366->95367 95368 f1272d 95366->95368 95370 eefddb 22 API calls 95367->95370 95403 f43209 23 API calls 95368->95403 95371 ed1ac3 95370->95371 95371->95312 95372 f12738 95373->95321 95374->95323 95404 f4092a 28 API calls 95374->95404 95376 eda961 22 API calls 95375->95376 95377 ed13fc 95376->95377 95378 eda961 22 API calls 95377->95378 95379 ed1404 95378->95379 95380 eda961 22 API calls 95379->95380 95381 ed13c6 95380->95381 95381->95328 95383 f14ba1 95382->95383 95384 ed6b67 _wcslen 95382->95384 95395 ed93b2 95383->95395 95387 ed6b7d 95384->95387 95388 ed6ba2 95384->95388 95386 f14baa 95386->95386 95394 ed6f34 22 API calls 95387->95394 95389 eefddb 22 API calls 95388->95389 95391 ed6bae 95389->95391 95392 eefe0b 22 API calls 95391->95392 95393 ed6b85 __fread_nolock 95392->95393 95393->95333 95394->95393 95396 ed93c0 95395->95396 95397 ed93c9 __fread_nolock 95395->95397 95396->95397 95398 edaec9 22 API calls 95396->95398 95397->95386 95397->95397 95398->95397 95399->95361 95400->95360 95401->95363 95402->95359 95403->95372 95405 ed2de3 95406 ed2df0 __wsopen_s 95405->95406 95407 ed2e09 95406->95407 95408 f12c2b ___scrt_fastfail 95406->95408 95421 ed3aa2 95407->95421 95411 f12c47 GetOpenFileNameW 95408->95411 95413 f12c96 95411->95413 95415 ed6b57 22 API calls 95413->95415 95417 f12cab 95415->95417 95417->95417 95418 ed2e27 95449 ed44a8 95418->95449 95478 f11f50 95421->95478 95424 ed3ace 95426 ed6b57 22 API calls 95424->95426 95425 ed3ae9 95484 eda6c3 95425->95484 95428 ed3ada 95426->95428 95480 ed37a0 95428->95480 95431 ed2da5 95432 f11f50 __wsopen_s 95431->95432 95433 ed2db2 GetLongPathNameW 95432->95433 95434 ed6b57 22 API calls 95433->95434 95435 ed2dda 95434->95435 95436 ed3598 95435->95436 95437 eda961 22 API calls 95436->95437 95438 ed35aa 95437->95438 95439 ed3aa2 23 API calls 95438->95439 95440 ed35b5 95439->95440 95441 f132eb 95440->95441 95442 ed35c0 95440->95442 95446 f1330d 95441->95446 95502 eece60 41 API calls 95441->95502 95490 ed515f 95442->95490 95448 ed35df 95448->95418 95503 ed4ecb 95449->95503 95452 f13833 95525 f42cf9 95452->95525 95454 ed4ecb 94 API calls 95456 ed44e1 95454->95456 95455 f13848 95457 f13869 95455->95457 95458 f1384c 95455->95458 95456->95452 95459 ed44e9 95456->95459 95461 eefe0b 22 API calls 95457->95461 95552 ed4f39 95458->95552 95462 f13854 95459->95462 95463 ed44f5 95459->95463 95477 f138ae 95461->95477 95558 f3da5a 82 API calls 95462->95558 95551 ed940c 136 API calls 2 library calls 95463->95551 95466 f13862 95466->95457 95467 ed2e31 95468 ed4f39 68 API calls 95471 f13a5f 95468->95471 95471->95468 95564 f3989b 82 API calls __wsopen_s 95471->95564 95474 ed9cb3 22 API calls 95474->95477 95477->95471 95477->95474 95559 f3967e 22 API calls __fread_nolock 95477->95559 95560 f395ad 42 API calls _wcslen 95477->95560 95561 f40b5a 22 API calls 95477->95561 95562 eda4a1 22 API calls __fread_nolock 95477->95562 95563 ed3ff7 22 API calls 95477->95563 95479 ed3aaf GetFullPathNameW 95478->95479 95479->95424 95479->95425 95481 ed37ae 95480->95481 95482 ed93b2 22 API calls 95481->95482 95483 ed2e12 95482->95483 95483->95431 95485 eda6dd 95484->95485 95486 eda6d0 95484->95486 95487 eefddb 22 API calls 95485->95487 95486->95428 95488 eda6e7 95487->95488 95489 eefe0b 22 API calls 95488->95489 95489->95486 95491 ed516e 95490->95491 95495 ed518f __fread_nolock 95490->95495 95494 eefe0b 22 API calls 95491->95494 95492 eefddb 22 API calls 95493 ed35cc 95492->95493 95496 ed35f3 95493->95496 95494->95495 95495->95492 95497 ed3605 95496->95497 95501 ed3624 __fread_nolock 95496->95501 95499 eefe0b 22 API calls 95497->95499 95498 eefddb 22 API calls 95500 ed363b 95498->95500 95499->95501 95500->95448 95501->95498 95502->95441 95565 ed4e90 LoadLibraryA 95503->95565 95508 ed4ef6 LoadLibraryExW 95573 ed4e59 LoadLibraryA 95508->95573 95509 f13ccf 95511 ed4f39 68 API calls 95509->95511 95513 f13cd6 95511->95513 95515 ed4e59 3 API calls 95513->95515 95517 f13cde 95515->95517 95516 ed4f20 95516->95517 95518 ed4f2c 95516->95518 95595 ed50f5 95517->95595 95519 ed4f39 68 API calls 95518->95519 95521 ed44cd 95519->95521 95521->95452 95521->95454 95524 f13d05 95526 f42d15 95525->95526 95527 ed511f 64 API calls 95526->95527 95528 f42d29 95527->95528 95745 f42e66 95528->95745 95531 ed50f5 40 API calls 95532 f42d56 95531->95532 95533 ed50f5 40 API calls 95532->95533 95534 f42d66 95533->95534 95535 ed50f5 40 API calls 95534->95535 95536 f42d81 95535->95536 95537 ed50f5 40 API calls 95536->95537 95538 f42d9c 95537->95538 95539 ed511f 64 API calls 95538->95539 95540 f42db3 95539->95540 95541 efea0c ___std_exception_copy 21 API calls 95540->95541 95542 f42dba 95541->95542 95543 efea0c ___std_exception_copy 21 API calls 95542->95543 95544 f42dc4 95543->95544 95545 ed50f5 40 API calls 95544->95545 95546 f42dd8 95545->95546 95547 f428fe 27 API calls 95546->95547 95549 f42dee 95547->95549 95548 f42d3f 95548->95455 95549->95548 95751 f422ce 79 API calls 95549->95751 95551->95467 95553 ed4f4a 95552->95553 95554 ed4f43 95552->95554 95556 ed4f59 95553->95556 95557 ed4f6a FreeLibrary 95553->95557 95752 efe678 95554->95752 95556->95462 95557->95556 95558->95466 95559->95477 95560->95477 95561->95477 95562->95477 95563->95477 95564->95471 95566 ed4ea8 GetProcAddress 95565->95566 95567 ed4ec6 95565->95567 95568 ed4eb8 95566->95568 95570 efe5eb 95567->95570 95568->95567 95569 ed4ebf FreeLibrary 95568->95569 95569->95567 95603 efe52a 95570->95603 95572 ed4eea 95572->95508 95572->95509 95574 ed4e8d 95573->95574 95575 ed4e6e GetProcAddress 95573->95575 95578 ed4f80 95574->95578 95576 ed4e7e 95575->95576 95576->95574 95577 ed4e86 FreeLibrary 95576->95577 95577->95574 95579 eefe0b 22 API calls 95578->95579 95580 ed4f95 95579->95580 95671 ed5722 95580->95671 95582 ed4fa1 __fread_nolock 95583 ed50a5 95582->95583 95584 f13d1d 95582->95584 95594 ed4fdc 95582->95594 95674 ed42a2 CreateStreamOnHGlobal 95583->95674 95685 f4304d 74 API calls 95584->95685 95587 f13d22 95589 ed511f 64 API calls 95587->95589 95588 ed50f5 40 API calls 95588->95594 95590 f13d45 95589->95590 95591 ed50f5 40 API calls 95590->95591 95592 ed506e messages 95591->95592 95592->95516 95594->95587 95594->95588 95594->95592 95680 ed511f 95594->95680 95596 ed5107 95595->95596 95599 f13d70 95595->95599 95707 efe8c4 95596->95707 95600 f428fe 95728 f4274e 95600->95728 95602 f42919 95602->95524 95606 efe536 ___scrt_is_nonwritable_in_current_image 95603->95606 95604 efe544 95628 eff2d9 20 API calls _abort 95604->95628 95606->95604 95608 efe574 95606->95608 95607 efe549 95629 f027ec 26 API calls __wsopen_s 95607->95629 95610 efe579 95608->95610 95611 efe586 95608->95611 95630 eff2d9 20 API calls _abort 95610->95630 95620 f08061 95611->95620 95614 efe554 __wsopen_s 95614->95572 95615 efe58f 95616 efe595 95615->95616 95617 efe5a2 95615->95617 95631 eff2d9 20 API calls _abort 95616->95631 95632 efe5d4 LeaveCriticalSection __fread_nolock 95617->95632 95621 f0806d ___scrt_is_nonwritable_in_current_image 95620->95621 95633 f02f5e EnterCriticalSection 95621->95633 95623 f0807b 95634 f080fb 95623->95634 95627 f080ac __wsopen_s 95627->95615 95628->95607 95629->95614 95630->95614 95631->95614 95632->95614 95633->95623 95640 f0811e 95634->95640 95635 f08177 95652 f04c7d 95635->95652 95640->95635 95640->95640 95643 f08088 95640->95643 95650 ef918d EnterCriticalSection 95640->95650 95651 ef91a1 LeaveCriticalSection 95640->95651 95641 f08189 95641->95643 95665 f03405 11 API calls 2 library calls 95641->95665 95647 f080b7 95643->95647 95644 f081a8 95666 ef918d EnterCriticalSection 95644->95666 95670 f02fa6 LeaveCriticalSection 95647->95670 95649 f080be 95649->95627 95650->95640 95651->95640 95657 f04c8a _abort 95652->95657 95653 f04cca 95668 eff2d9 20 API calls _abort 95653->95668 95654 f04cb5 RtlAllocateHeap 95655 f04cc8 95654->95655 95654->95657 95659 f029c8 95655->95659 95657->95653 95657->95654 95667 ef4ead 7 API calls 2 library calls 95657->95667 95660 f029d3 RtlFreeHeap 95659->95660 95664 f029fc _free 95659->95664 95661 f029e8 95660->95661 95660->95664 95669 eff2d9 20 API calls _abort 95661->95669 95663 f029ee GetLastError 95663->95664 95664->95641 95665->95644 95666->95643 95667->95657 95668->95655 95669->95663 95670->95649 95672 eefddb 22 API calls 95671->95672 95673 ed5734 95672->95673 95673->95582 95675 ed42bc FindResourceExW 95674->95675 95679 ed42d9 95674->95679 95676 f135ba LoadResource 95675->95676 95675->95679 95677 f135cf SizeofResource 95676->95677 95676->95679 95678 f135e3 LockResource 95677->95678 95677->95679 95678->95679 95679->95594 95681 f13d90 95680->95681 95682 ed512e 95680->95682 95686 efece3 95682->95686 95685->95587 95689 efeaaa 95686->95689 95688 ed513c 95688->95594 95691 efeab6 ___scrt_is_nonwritable_in_current_image 95689->95691 95690 efeac2 95702 eff2d9 20 API calls _abort 95690->95702 95691->95690 95692 efeae8 95691->95692 95704 ef918d EnterCriticalSection 95692->95704 95695 efeac7 95703 f027ec 26 API calls __wsopen_s 95695->95703 95697 efeaf4 95705 efec0a 62 API calls 2 library calls 95697->95705 95699 efeb08 95706 efeb27 LeaveCriticalSection __fread_nolock 95699->95706 95701 efead2 __wsopen_s 95701->95688 95702->95695 95703->95701 95704->95697 95705->95699 95706->95701 95710 efe8e1 95707->95710 95709 ed5118 95709->95600 95711 efe8ed ___scrt_is_nonwritable_in_current_image 95710->95711 95712 efe92d 95711->95712 95713 efe900 ___scrt_fastfail 95711->95713 95714 efe925 __wsopen_s 95711->95714 95725 ef918d EnterCriticalSection 95712->95725 95723 eff2d9 20 API calls _abort 95713->95723 95714->95709 95717 efe937 95726 efe6f8 38 API calls 4 library calls 95717->95726 95718 efe91a 95724 f027ec 26 API calls __wsopen_s 95718->95724 95721 efe94e 95727 efe96c LeaveCriticalSection __fread_nolock 95721->95727 95723->95718 95724->95714 95725->95717 95726->95721 95727->95714 95731 efe4e8 95728->95731 95730 f4275d 95730->95602 95734 efe469 95731->95734 95733 efe505 95733->95730 95735 efe48c 95734->95735 95736 efe478 95734->95736 95741 efe488 __alldvrm 95735->95741 95744 f0333f 11 API calls 2 library calls 95735->95744 95742 eff2d9 20 API calls _abort 95736->95742 95738 efe47d 95743 f027ec 26 API calls __wsopen_s 95738->95743 95741->95733 95742->95738 95743->95741 95744->95741 95747 f42e7a 95745->95747 95746 f428fe 27 API calls 95746->95747 95747->95746 95748 ed50f5 40 API calls 95747->95748 95749 f42d3b 95747->95749 95750 ed511f 64 API calls 95747->95750 95748->95747 95749->95531 95749->95548 95750->95747 95751->95548 95753 efe684 ___scrt_is_nonwritable_in_current_image 95752->95753 95754 efe6aa 95753->95754 95755 efe695 95753->95755 95757 efe6a5 __wsopen_s 95754->95757 95767 ef918d EnterCriticalSection 95754->95767 95765 eff2d9 20 API calls _abort 95755->95765 95757->95553 95758 efe69a 95766 f027ec 26 API calls __wsopen_s 95758->95766 95761 efe6c6 95768 efe602 95761->95768 95763 efe6d1 95784 efe6ee LeaveCriticalSection __fread_nolock 95763->95784 95765->95758 95766->95757 95767->95761 95769 efe60f 95768->95769 95770 efe624 95768->95770 95785 eff2d9 20 API calls _abort 95769->95785 95776 efe61f 95770->95776 95787 efdc0b 95770->95787 95772 efe614 95786 f027ec 26 API calls __wsopen_s 95772->95786 95776->95763 95780 efe646 95804 f0862f 95780->95804 95783 f029c8 _free 20 API calls 95783->95776 95784->95757 95785->95772 95786->95776 95788 efdc1f 95787->95788 95789 efdc23 95787->95789 95793 f04d7a 95788->95793 95789->95788 95790 efd955 __fread_nolock 26 API calls 95789->95790 95791 efdc43 95790->95791 95819 f059be 62 API calls 4 library calls 95791->95819 95794 f04d90 95793->95794 95796 efe640 95793->95796 95795 f029c8 _free 20 API calls 95794->95795 95794->95796 95795->95796 95797 efd955 95796->95797 95798 efd976 95797->95798 95799 efd961 95797->95799 95798->95780 95820 eff2d9 20 API calls _abort 95799->95820 95801 efd966 95821 f027ec 26 API calls __wsopen_s 95801->95821 95803 efd971 95803->95780 95805 f08653 95804->95805 95806 f0863e 95804->95806 95808 f0868e 95805->95808 95813 f0867a 95805->95813 95822 eff2c6 20 API calls _abort 95806->95822 95827 eff2c6 20 API calls _abort 95808->95827 95809 f08643 95823 eff2d9 20 API calls _abort 95809->95823 95811 f08693 95828 eff2d9 20 API calls _abort 95811->95828 95824 f08607 95813->95824 95816 f0869b 95829 f027ec 26 API calls __wsopen_s 95816->95829 95817 efe64c 95817->95776 95817->95783 95819->95788 95820->95801 95821->95803 95822->95809 95823->95817 95830 f08585 95824->95830 95826 f0862b 95826->95817 95827->95811 95828->95816 95829->95817 95831 f08591 ___scrt_is_nonwritable_in_current_image 95830->95831 95841 f05147 EnterCriticalSection 95831->95841 95833 f0859f 95834 f085d1 95833->95834 95835 f085c6 95833->95835 95857 eff2d9 20 API calls _abort 95834->95857 95842 f086ae 95835->95842 95838 f085cc 95858 f085fb LeaveCriticalSection __wsopen_s 95838->95858 95840 f085ee __wsopen_s 95840->95826 95841->95833 95859 f053c4 95842->95859 95844 f086c4 95872 f05333 21 API calls 3 library calls 95844->95872 95846 f086be 95846->95844 95847 f086f6 95846->95847 95850 f053c4 __wsopen_s 26 API calls 95846->95850 95847->95844 95848 f053c4 __wsopen_s 26 API calls 95847->95848 95851 f08702 CloseHandle 95848->95851 95849 f0871c 95852 f0873e 95849->95852 95873 eff2a3 20 API calls 2 library calls 95849->95873 95853 f086ed 95850->95853 95851->95844 95854 f0870e GetLastError 95851->95854 95852->95838 95856 f053c4 __wsopen_s 26 API calls 95853->95856 95854->95844 95856->95847 95857->95838 95858->95840 95860 f053d1 95859->95860 95861 f053e6 95859->95861 95874 eff2c6 20 API calls _abort 95860->95874 95865 f0540b 95861->95865 95876 eff2c6 20 API calls _abort 95861->95876 95864 f053d6 95875 eff2d9 20 API calls _abort 95864->95875 95865->95846 95866 f05416 95877 eff2d9 20 API calls _abort 95866->95877 95869 f053de 95869->95846 95870 f0541e 95878 f027ec 26 API calls __wsopen_s 95870->95878 95872->95849 95873->95852 95874->95864 95875->95869 95876->95866 95877->95870 95878->95869 95879 eddefc 95882 ed1d6f 95879->95882 95881 eddf07 95883 ed1d8c 95882->95883 95891 ed1f6f 95883->95891 95885 ed1da6 95886 f12759 95885->95886 95888 ed1e36 95885->95888 95889 ed1dc2 95885->95889 95895 f4359c 82 API calls __wsopen_s 95886->95895 95888->95881 95889->95888 95894 ed289a 23 API calls 95889->95894 95892 edec40 348 API calls 95891->95892 95893 ed1f98 95892->95893 95893->95885 95894->95888 95895->95888 95896 f22a00 95911 edd7b0 messages 95896->95911 95897 eddb11 PeekMessageW 95897->95911 95898 edd807 GetInputState 95898->95897 95898->95911 95900 f21cbe TranslateAcceleratorW 95900->95911 95901 edda04 timeGetTime 95901->95911 95902 eddb8f PeekMessageW 95902->95911 95903 eddb73 TranslateMessage DispatchMessageW 95903->95902 95904 eddbaf Sleep 95904->95911 95905 f22b74 Sleep 95917 f22a51 95905->95917 95908 f21dda timeGetTime 95997 eee300 23 API calls 95908->95997 95911->95897 95911->95898 95911->95900 95911->95901 95911->95902 95911->95903 95911->95904 95911->95905 95911->95908 95911->95917 95918 edd9d5 95911->95918 95924 edec40 348 API calls 95911->95924 95926 edbf40 348 API calls 95911->95926 95928 eddd50 95911->95928 95935 ee1310 95911->95935 95990 eeedf6 95911->95990 95995 eddfd0 348 API calls 3 library calls 95911->95995 95996 eee551 timeGetTime 95911->95996 95998 f43a2a 23 API calls 95911->95998 95999 f4359c 82 API calls __wsopen_s 95911->95999 95912 f22c0b GetExitCodeProcess 95915 f22c21 WaitForSingleObject 95912->95915 95916 f22c37 CloseHandle 95912->95916 95913 f629bf GetForegroundWindow 95913->95917 95915->95911 95915->95916 95916->95917 95917->95911 95917->95912 95917->95913 95917->95918 95919 f22ca9 Sleep 95917->95919 96000 f55658 23 API calls 95917->96000 96001 f3e97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 95917->96001 96002 eee551 timeGetTime 95917->96002 96003 f3d4dc CreateToolhelp32Snapshot Process32FirstW 95917->96003 95919->95911 95924->95911 95926->95911 95929 eddd6f 95928->95929 95930 eddd83 95928->95930 96013 edd260 95929->96013 96045 f4359c 82 API calls __wsopen_s 95930->96045 95932 eddd7a 95932->95911 95934 f22f75 95934->95934 95936 ee1376 95935->95936 95937 ee17b0 95935->95937 95939 f26331 95936->95939 95940 ee1390 95936->95940 96081 ef0242 5 API calls __Init_thread_wait 95937->96081 95941 f2633d 95939->95941 96091 f5709c 348 API calls 95939->96091 95944 ee1940 9 API calls 95940->95944 95941->95911 95943 ee17ba 95945 ee17fb 95943->95945 96082 ed9cb3 95943->96082 95946 ee13a0 95944->95946 95950 f26346 95945->95950 95952 ee182c 95945->95952 95947 ee1940 9 API calls 95946->95947 95949 ee13b6 95947->95949 95949->95945 95951 ee13ec 95949->95951 96092 f4359c 82 API calls __wsopen_s 95950->96092 95951->95950 95975 ee1408 __fread_nolock 95951->95975 95953 edaceb 23 API calls 95952->95953 95955 ee1839 95953->95955 96089 eed217 348 API calls 95955->96089 95956 ee17d4 96088 ef01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 95956->96088 95959 f2636e 96093 f4359c 82 API calls __wsopen_s 95959->96093 95960 ee152f 95962 ee153c 95960->95962 95963 f263d1 95960->95963 95965 ee1940 9 API calls 95962->95965 96095 f55745 54 API calls _wcslen 95963->96095 95966 ee1549 95965->95966 95970 ee1940 9 API calls 95966->95970 95974 ee15c7 messages 95966->95974 95967 eefddb 22 API calls 95967->95975 95968 eefe0b 22 API calls 95968->95975 95969 ee1872 96090 eefaeb 23 API calls 95969->96090 95978 ee1563 95970->95978 95971 ee171d 95971->95911 95974->95969 95976 ee167b messages 95974->95976 95979 ee1940 9 API calls 95974->95979 96052 f5ab67 95974->96052 96055 f5a2ea 95974->96055 96060 f5abf7 95974->96060 96065 eef645 95974->96065 96072 f61591 95974->96072 96075 f45c5a 95974->96075 96097 f4359c 82 API calls __wsopen_s 95974->96097 95975->95955 95975->95959 95975->95960 95975->95967 95975->95968 95975->95974 95977 edec40 348 API calls 95975->95977 95980 f263b2 95975->95980 95976->95971 96080 eece17 22 API calls messages 95976->96080 95977->95975 95978->95974 96096 eda8c7 22 API calls __fread_nolock 95978->96096 95979->95974 96094 f4359c 82 API calls __wsopen_s 95980->96094 95991 eeee09 95990->95991 95993 eeee12 95990->95993 95991->95911 95992 eeee36 IsDialogMessageW 95992->95991 95992->95993 95993->95991 95993->95992 95994 f2efaf GetClassLongW 95993->95994 95994->95992 95994->95993 95995->95911 95996->95911 95997->95911 95998->95911 95999->95911 96000->95917 96001->95917 96002->95917 96269 f3def7 96003->96269 96005 f3d5db CloseHandle 96005->95917 96006 f3d529 Process32NextW 96006->96005 96007 f3d522 96006->96007 96007->96005 96007->96006 96008 eda961 22 API calls 96007->96008 96009 ed9cb3 22 API calls 96007->96009 96275 ed525f 22 API calls 96007->96275 96276 ed6350 22 API calls 96007->96276 96277 eece60 41 API calls 96007->96277 96008->96007 96009->96007 96014 edec40 348 API calls 96013->96014 96034 edd29d 96014->96034 96015 f21bc4 96051 f4359c 82 API calls __wsopen_s 96015->96051 96017 edd6d5 96019 edd30b messages 96017->96019 96028 eefe0b 22 API calls 96017->96028 96018 edd3c3 96018->96017 96021 edd3ce 96018->96021 96019->95932 96020 edd5ff 96022 f21bb5 96020->96022 96023 edd614 96020->96023 96025 eefddb 22 API calls 96021->96025 96050 f55705 23 API calls 96022->96050 96027 eefddb 22 API calls 96023->96027 96024 edd4b8 96029 eefe0b 22 API calls 96024->96029 96032 edd3d5 __fread_nolock 96025->96032 96037 edd46a 96027->96037 96028->96032 96040 edd429 __fread_nolock messages 96029->96040 96030 eefddb 22 API calls 96031 edd3f6 96030->96031 96031->96040 96046 edbec0 348 API calls 96031->96046 96032->96030 96032->96031 96033 eefddb 22 API calls 96033->96034 96034->96015 96034->96017 96034->96018 96034->96019 96034->96024 96034->96033 96034->96040 96036 f21ba4 96049 f4359c 82 API calls __wsopen_s 96036->96049 96037->95932 96039 ed1f6f 348 API calls 96039->96040 96040->96020 96040->96036 96040->96037 96040->96039 96041 f21b7f 96040->96041 96043 f21b5d 96040->96043 96048 f4359c 82 API calls __wsopen_s 96041->96048 96047 f4359c 82 API calls __wsopen_s 96043->96047 96045->95934 96046->96040 96047->96037 96048->96037 96049->96037 96050->96015 96051->96019 96098 f5aff9 96052->96098 96056 ed7510 53 API calls 96055->96056 96057 f5a306 96056->96057 96058 f3d4dc 47 API calls 96057->96058 96059 f5a315 96058->96059 96059->95974 96061 f5aff9 217 API calls 96060->96061 96063 f5ac0c 96061->96063 96062 f5ac54 96062->95974 96063->96062 96064 edaceb 23 API calls 96063->96064 96064->96062 96066 edb567 39 API calls 96065->96066 96067 eef659 96066->96067 96068 f2f2dc Sleep 96067->96068 96069 eef661 timeGetTime 96067->96069 96070 edb567 39 API calls 96069->96070 96071 eef677 96070->96071 96071->95974 96253 f62ad8 96072->96253 96074 f6159f 96074->95974 96076 ed7510 53 API calls 96075->96076 96077 f45c6d 96076->96077 96264 f3dbbe lstrlenW 96077->96264 96079 f45c77 96079->95974 96080->95976 96081->95943 96083 ed9cc2 _wcslen 96082->96083 96084 eefe0b 22 API calls 96083->96084 96085 ed9cea __fread_nolock 96084->96085 96086 eefddb 22 API calls 96085->96086 96087 ed9d00 96086->96087 96087->95956 96088->95945 96089->95969 96090->95969 96091->95941 96092->95974 96093->95974 96094->95974 96095->95978 96096->95974 96097->95974 96099 f5b01d ___scrt_fastfail 96098->96099 96100 f5b094 96099->96100 96101 f5b058 96099->96101 96105 edb567 39 API calls 96100->96105 96106 f5b08b 96100->96106 96219 edb567 96101->96219 96103 f5b063 96103->96106 96109 edb567 39 API calls 96103->96109 96104 f5b0ed 96189 ed7510 96104->96189 96108 f5b0a5 96105->96108 96106->96104 96110 edb567 39 API calls 96106->96110 96112 edb567 39 API calls 96108->96112 96113 f5b078 96109->96113 96110->96104 96112->96106 96116 edb567 39 API calls 96113->96116 96115 f5b115 96117 f5b11f 96115->96117 96118 f5b1d8 96115->96118 96116->96106 96119 ed7510 53 API calls 96117->96119 96120 f5b20a GetCurrentDirectoryW 96118->96120 96123 ed7510 53 API calls 96118->96123 96121 f5b130 96119->96121 96122 eefe0b 22 API calls 96120->96122 96124 ed7620 22 API calls 96121->96124 96125 f5b22f GetCurrentDirectoryW 96122->96125 96126 f5b1ef 96123->96126 96127 f5b13a 96124->96127 96128 f5b23c 96125->96128 96129 ed7620 22 API calls 96126->96129 96130 ed7510 53 API calls 96127->96130 96133 f5b275 96128->96133 96224 ed9c6e 22 API calls 96128->96224 96131 f5b1f9 _wcslen 96129->96131 96132 f5b14b 96130->96132 96131->96120 96131->96133 96134 ed7620 22 API calls 96132->96134 96138 f5b287 96133->96138 96139 f5b28b 96133->96139 96136 f5b155 96134->96136 96140 ed7510 53 API calls 96136->96140 96137 f5b255 96225 ed9c6e 22 API calls 96137->96225 96146 f5b2f8 96138->96146 96147 f5b39a CreateProcessW 96138->96147 96227 f407c0 10 API calls 96139->96227 96143 f5b166 96140->96143 96148 ed7620 22 API calls 96143->96148 96144 f5b265 96226 ed9c6e 22 API calls 96144->96226 96145 f5b294 96228 f406e6 10 API calls 96145->96228 96230 f311c8 39 API calls 96146->96230 96188 f5b32f _wcslen 96147->96188 96152 f5b170 96148->96152 96155 f5b1a6 GetSystemDirectoryW 96152->96155 96160 ed7510 53 API calls 96152->96160 96153 f5b2aa 96229 f405a7 8 API calls 96153->96229 96154 f5b2fd 96158 f5b323 96154->96158 96159 f5b32a 96154->96159 96157 eefe0b 22 API calls 96155->96157 96164 f5b1cb GetSystemDirectoryW 96157->96164 96231 f31201 128 API calls 2 library calls 96158->96231 96232 f314ce 6 API calls 96159->96232 96161 f5b187 96160->96161 96166 ed7620 22 API calls 96161->96166 96163 f5b2d0 96163->96138 96164->96128 96168 f5b191 _wcslen 96166->96168 96167 f5b328 96167->96188 96168->96128 96168->96155 96169 f5b3d6 GetLastError 96178 f5b41a 96169->96178 96170 f5b42f CloseHandle 96171 f5b43f 96170->96171 96179 f5b49a 96170->96179 96172 f5b446 CloseHandle 96171->96172 96173 f5b451 96171->96173 96172->96173 96176 f5b463 96173->96176 96177 f5b458 CloseHandle 96173->96177 96175 f5b4a6 96175->96178 96180 f5b475 96176->96180 96181 f5b46a CloseHandle 96176->96181 96177->96176 96216 f40175 96178->96216 96179->96175 96184 f5b4d2 CloseHandle 96179->96184 96233 f409d9 34 API calls 96180->96233 96181->96180 96184->96178 96186 f5b486 96234 f5b536 25 API calls 96186->96234 96188->96169 96188->96170 96190 ed7525 96189->96190 96205 ed7522 96189->96205 96191 ed752d 96190->96191 96192 ed755b 96190->96192 96235 ef51c6 26 API calls 96191->96235 96194 ed756d 96192->96194 96201 f150f6 96192->96201 96203 f1500f 96192->96203 96236 eefb21 51 API calls 96194->96236 96197 ed753d 96200 eefddb 22 API calls 96197->96200 96198 f1510e 96198->96198 96202 ed7547 96200->96202 96238 ef5183 26 API calls 96201->96238 96204 ed9cb3 22 API calls 96202->96204 96206 eefe0b 22 API calls 96203->96206 96211 f15088 96203->96211 96204->96205 96212 ed7620 96205->96212 96207 f15058 96206->96207 96208 eefddb 22 API calls 96207->96208 96209 f1507f 96208->96209 96210 ed9cb3 22 API calls 96209->96210 96210->96211 96237 eefb21 51 API calls 96211->96237 96213 ed762a _wcslen 96212->96213 96214 eefe0b 22 API calls 96213->96214 96215 ed763f 96214->96215 96215->96115 96239 f4030f 96216->96239 96220 edb578 96219->96220 96221 edb57f 96219->96221 96220->96221 96252 ef62d1 39 API calls 96220->96252 96221->96103 96223 edb5c2 96223->96103 96224->96137 96225->96144 96226->96133 96227->96145 96228->96153 96229->96163 96230->96154 96231->96167 96232->96188 96233->96186 96234->96179 96235->96197 96236->96197 96237->96201 96238->96198 96240 f40321 CloseHandle 96239->96240 96241 f40329 96239->96241 96240->96241 96242 f40336 96241->96242 96243 f4032e CloseHandle 96241->96243 96244 f40343 96242->96244 96245 f4033b CloseHandle 96242->96245 96243->96242 96246 f40350 96244->96246 96247 f40348 CloseHandle 96244->96247 96245->96244 96248 f40355 CloseHandle 96246->96248 96249 f4035d 96246->96249 96247->96246 96248->96249 96250 f40362 CloseHandle 96249->96250 96251 f4017d 96249->96251 96250->96251 96251->95974 96252->96223 96254 edaceb 23 API calls 96253->96254 96255 f62af3 96254->96255 96256 f62aff 96255->96256 96257 f62b1d 96255->96257 96258 ed7510 53 API calls 96256->96258 96259 ed6b57 22 API calls 96257->96259 96260 f62b0c 96258->96260 96262 f62b1b 96259->96262 96260->96262 96263 eda8c7 22 API calls __fread_nolock 96260->96263 96262->96074 96263->96262 96265 f3dc06 96264->96265 96266 f3dbdc GetFileAttributesW 96264->96266 96265->96079 96266->96265 96267 f3dbe8 FindFirstFileW 96266->96267 96267->96265 96268 f3dbf9 FindClose 96267->96268 96268->96265 96270 f3df02 96269->96270 96271 f3df19 96270->96271 96274 f3df1f 96270->96274 96278 ef63b2 GetStringTypeW _strftime 96270->96278 96279 ef62fb 39 API calls 96271->96279 96274->96007 96275->96007 96276->96007 96277->96007 96278->96270 96279->96274 96280 f08402 96285 f081be 96280->96285 96283 f0842a 96286 f081ef try_get_first_available_module 96285->96286 96293 f08338 96286->96293 96300 ef8e0b 40 API calls 2 library calls 96286->96300 96288 f083ee 96304 f027ec 26 API calls __wsopen_s 96288->96304 96290 f08343 96290->96283 96297 f10984 96290->96297 96292 f0838c 96292->96293 96301 ef8e0b 40 API calls 2 library calls 96292->96301 96293->96290 96303 eff2d9 20 API calls _abort 96293->96303 96295 f083ab 96295->96293 96302 ef8e0b 40 API calls 2 library calls 96295->96302 96305 f10081 96297->96305 96299 f1099f 96299->96283 96300->96292 96301->96295 96302->96293 96303->96288 96304->96290 96307 f1008d ___scrt_is_nonwritable_in_current_image 96305->96307 96306 f1009b 96362 eff2d9 20 API calls _abort 96306->96362 96307->96306 96309 f100d4 96307->96309 96316 f1065b 96309->96316 96310 f100a0 96363 f027ec 26 API calls __wsopen_s 96310->96363 96315 f100aa __wsopen_s 96315->96299 96317 f10678 96316->96317 96318 f106a6 96317->96318 96319 f1068d 96317->96319 96365 f05221 96318->96365 96379 eff2c6 20 API calls _abort 96319->96379 96322 f106ab 96323 f106b4 96322->96323 96324 f106cb 96322->96324 96381 eff2c6 20 API calls _abort 96323->96381 96378 f1039a CreateFileW 96324->96378 96328 f106b9 96382 eff2d9 20 API calls _abort 96328->96382 96329 f10704 96331 f10781 GetFileType 96329->96331 96333 f10756 GetLastError 96329->96333 96383 f1039a CreateFileW 96329->96383 96332 f1078c GetLastError 96331->96332 96336 f107d3 96331->96336 96385 eff2a3 20 API calls 2 library calls 96332->96385 96384 eff2a3 20 API calls 2 library calls 96333->96384 96387 f0516a 21 API calls 3 library calls 96336->96387 96337 f10692 96380 eff2d9 20 API calls _abort 96337->96380 96338 f1079a CloseHandle 96338->96337 96342 f107c3 96338->96342 96341 f10749 96341->96331 96341->96333 96386 eff2d9 20 API calls _abort 96342->96386 96343 f107f4 96345 f10840 96343->96345 96388 f105ab 72 API calls 4 library calls 96343->96388 96350 f1086d 96345->96350 96389 f1014d 72 API calls 4 library calls 96345->96389 96346 f107c8 96346->96337 96349 f10866 96349->96350 96351 f1087e 96349->96351 96352 f086ae __wsopen_s 29 API calls 96350->96352 96353 f100f8 96351->96353 96354 f108fc CloseHandle 96351->96354 96352->96353 96364 f10121 LeaveCriticalSection __wsopen_s 96353->96364 96390 f1039a CreateFileW 96354->96390 96356 f10927 96357 f10931 GetLastError 96356->96357 96358 f1095d 96356->96358 96391 eff2a3 20 API calls 2 library calls 96357->96391 96358->96353 96360 f1093d 96392 f05333 21 API calls 3 library calls 96360->96392 96362->96310 96363->96315 96364->96315 96366 f0522d ___scrt_is_nonwritable_in_current_image 96365->96366 96393 f02f5e EnterCriticalSection 96366->96393 96368 f05259 96397 f05000 96368->96397 96371 f05234 96371->96368 96372 f052c7 EnterCriticalSection 96371->96372 96376 f0527b 96371->96376 96375 f052d4 LeaveCriticalSection 96372->96375 96372->96376 96374 f052a4 __wsopen_s 96374->96322 96375->96371 96394 f0532a 96376->96394 96378->96329 96379->96337 96380->96353 96381->96328 96382->96337 96383->96341 96384->96337 96385->96338 96386->96346 96387->96343 96388->96345 96389->96349 96390->96356 96391->96360 96392->96358 96393->96371 96405 f02fa6 LeaveCriticalSection 96394->96405 96396 f05331 96396->96374 96398 f04c7d _abort 20 API calls 96397->96398 96399 f05012 96398->96399 96403 f0501f 96399->96403 96406 f03405 11 API calls 2 library calls 96399->96406 96400 f029c8 _free 20 API calls 96401 f05071 96400->96401 96401->96376 96404 f05147 EnterCriticalSection 96401->96404 96403->96400 96404->96376 96405->96396 96406->96399 96407 edf7bf 96408 edfcb6 96407->96408 96409 edf7d3 96407->96409 96411 edaceb 23 API calls 96408->96411 96410 edfcc2 96409->96410 96412 eefddb 22 API calls 96409->96412 96413 edaceb 23 API calls 96410->96413 96411->96410 96414 edf7e5 96412->96414 96416 edfd3d 96413->96416 96414->96410 96415 edf83e 96414->96415 96414->96416 96418 ee1310 348 API calls 96415->96418 96434 eded9d messages 96415->96434 96444 f41155 22 API calls 96416->96444 96440 edec76 messages 96418->96440 96419 eefddb 22 API calls 96419->96440 96420 f24beb 96450 f4359c 82 API calls __wsopen_s 96420->96450 96421 edfef7 96421->96434 96446 eda8c7 22 API calls __fread_nolock 96421->96446 96424 f24b0b 96448 f4359c 82 API calls __wsopen_s 96424->96448 96425 eda8c7 22 API calls 96425->96440 96426 f24600 96426->96434 96445 eda8c7 22 API calls __fread_nolock 96426->96445 96431 ef0242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 96431->96440 96433 edfbe3 96433->96434 96436 f24bdc 96433->96436 96441 edf3ae messages 96433->96441 96435 eda961 22 API calls 96435->96440 96449 f4359c 82 API calls __wsopen_s 96436->96449 96438 ef01f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 96438->96440 96439 ef00a3 29 API calls pre_c_initialization 96439->96440 96440->96419 96440->96420 96440->96421 96440->96424 96440->96425 96440->96426 96440->96431 96440->96433 96440->96434 96440->96435 96440->96438 96440->96439 96440->96441 96442 ee01e0 348 API calls 2 library calls 96440->96442 96443 ee06a0 41 API calls messages 96440->96443 96441->96434 96447 f4359c 82 API calls __wsopen_s 96441->96447 96442->96440 96443->96440 96444->96434 96445->96434 96446->96434 96447->96434 96448->96434 96449->96420 96450->96434 96451 f12402 96454 ed1410 96451->96454 96455 ed144f mciSendStringW 96454->96455 96456 f124b8 DestroyWindow 96454->96456 96457 ed146b 96455->96457 96458 ed16c6 96455->96458 96469 f124c4 96456->96469 96460 ed1479 96457->96460 96457->96469 96458->96457 96459 ed16d5 UnregisterHotKey 96458->96459 96459->96458 96487 ed182e 96460->96487 96463 f12509 96468 f1252d 96463->96468 96470 f1251c FreeLibrary 96463->96470 96464 f124e2 FindClose 96464->96469 96465 f124d8 96465->96469 96493 ed6246 CloseHandle 96465->96493 96466 ed148e 96466->96468 96475 ed149c 96466->96475 96471 f12541 VirtualFree 96468->96471 96478 ed1509 96468->96478 96469->96463 96469->96464 96469->96465 96470->96463 96471->96468 96472 ed14f8 CoUninitialize 96472->96478 96473 f12589 96480 f12598 messages 96473->96480 96494 f432eb 6 API calls messages 96473->96494 96474 ed1514 96477 ed1524 96474->96477 96475->96472 96491 ed1944 VirtualFreeEx CloseHandle 96477->96491 96478->96473 96478->96474 96484 f12627 96480->96484 96495 f364d4 22 API calls messages 96480->96495 96482 ed153a 96482->96480 96483 ed161f 96482->96483 96483->96484 96492 ed1876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 96483->96492 96484->96484 96486 ed16c1 96489 ed183b 96487->96489 96488 ed1480 96488->96463 96488->96466 96489->96488 96496 f3702a 22 API calls 96489->96496 96491->96482 96492->96486 96493->96465 96494->96473 96495->96480 96496->96489 96497 ef03fb 96498 ef0407 ___scrt_is_nonwritable_in_current_image 96497->96498 96526 eefeb1 96498->96526 96500 ef040e 96501 ef0561 96500->96501 96505 ef0438 96500->96505 96556 ef083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 96501->96556 96503 ef0568 96549 ef4e52 96503->96549 96515 ef0477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 96505->96515 96537 f0247d 96505->96537 96511 ef0457 96513 ef04d8 96545 ef0959 96513->96545 96515->96513 96552 ef4e1a 38 API calls 3 library calls 96515->96552 96517 ef04de 96518 ef04f3 96517->96518 96553 ef0992 GetModuleHandleW 96518->96553 96520 ef04fa 96520->96503 96521 ef04fe 96520->96521 96522 ef0507 96521->96522 96554 ef4df5 28 API calls _abort 96521->96554 96555 ef0040 13 API calls 2 library calls 96522->96555 96525 ef050f 96525->96511 96527 eefeba 96526->96527 96558 ef0698 IsProcessorFeaturePresent 96527->96558 96529 eefec6 96559 ef2c94 10 API calls 3 library calls 96529->96559 96531 eefecb 96532 eefecf 96531->96532 96560 f02317 96531->96560 96532->96500 96535 eefee6 96535->96500 96540 f02494 96537->96540 96538 ef0a8c CatchGuardHandler 5 API calls 96539 ef0451 96538->96539 96539->96511 96541 f02421 96539->96541 96540->96538 96542 f02450 96541->96542 96543 ef0a8c CatchGuardHandler 5 API calls 96542->96543 96544 f02479 96543->96544 96544->96515 96611 ef2340 96545->96611 96548 ef097f 96548->96517 96613 ef4bcf 96549->96613 96552->96513 96553->96520 96554->96522 96555->96525 96556->96503 96558->96529 96559->96531 96564 f0d1f6 96560->96564 96563 ef2cbd 8 API calls 3 library calls 96563->96532 96567 f0d213 96564->96567 96568 f0d20f 96564->96568 96566 eefed8 96566->96535 96566->96563 96567->96568 96570 f04bfb 96567->96570 96582 ef0a8c 96568->96582 96571 f04c07 ___scrt_is_nonwritable_in_current_image 96570->96571 96589 f02f5e EnterCriticalSection 96571->96589 96573 f04c0e 96590 f050af 96573->96590 96575 f04c1d 96576 f04c2c 96575->96576 96603 f04a8f 29 API calls 96575->96603 96605 f04c48 LeaveCriticalSection _abort 96576->96605 96579 f04c27 96604 f04b45 GetStdHandle GetFileType 96579->96604 96580 f04c3d __wsopen_s 96580->96567 96583 ef0a97 IsProcessorFeaturePresent 96582->96583 96584 ef0a95 96582->96584 96586 ef0c5d 96583->96586 96584->96566 96610 ef0c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 96586->96610 96588 ef0d40 96588->96566 96589->96573 96591 f050bb ___scrt_is_nonwritable_in_current_image 96590->96591 96592 f050c8 96591->96592 96593 f050df 96591->96593 96607 eff2d9 20 API calls _abort 96592->96607 96606 f02f5e EnterCriticalSection 96593->96606 96596 f050cd 96608 f027ec 26 API calls __wsopen_s 96596->96608 96598 f050d7 __wsopen_s 96598->96575 96599 f05117 96609 f0513e LeaveCriticalSection _abort 96599->96609 96601 f05000 __wsopen_s 21 API calls 96602 f050eb 96601->96602 96602->96599 96602->96601 96603->96579 96604->96576 96605->96580 96606->96602 96607->96596 96608->96598 96609->96598 96610->96588 96612 ef096c GetStartupInfoW 96611->96612 96612->96548 96614 ef4bdb FindHandler 96613->96614 96615 ef4bf4 96614->96615 96616 ef4be2 96614->96616 96637 f02f5e EnterCriticalSection 96615->96637 96652 ef4d29 GetModuleHandleW 96616->96652 96619 ef4be7 96619->96615 96653 ef4d6d GetModuleHandleExW 96619->96653 96620 ef4c99 96641 ef4cd9 96620->96641 96624 ef4c70 96628 ef4c88 96624->96628 96633 f02421 _abort 5 API calls 96624->96633 96626 ef4cb6 96644 ef4ce8 96626->96644 96627 ef4ce2 96661 f11d29 5 API calls CatchGuardHandler 96627->96661 96634 f02421 _abort 5 API calls 96628->96634 96629 ef4bfb 96629->96620 96629->96624 96638 f021a8 96629->96638 96633->96628 96634->96620 96637->96629 96662 f01ee1 96638->96662 96681 f02fa6 LeaveCriticalSection 96641->96681 96643 ef4cb2 96643->96626 96643->96627 96682 f0360c 96644->96682 96647 ef4d16 96650 ef4d6d _abort 8 API calls 96647->96650 96648 ef4cf6 GetPEB 96648->96647 96649 ef4d06 GetCurrentProcess TerminateProcess 96648->96649 96649->96647 96651 ef4d1e ExitProcess 96650->96651 96652->96619 96654 ef4dba 96653->96654 96655 ef4d97 GetProcAddress 96653->96655 96656 ef4dc9 96654->96656 96657 ef4dc0 FreeLibrary 96654->96657 96658 ef4dac 96655->96658 96659 ef0a8c CatchGuardHandler 5 API calls 96656->96659 96657->96656 96658->96654 96660 ef4bf3 96659->96660 96660->96615 96665 f01e90 96662->96665 96664 f01f05 96664->96624 96666 f01e9c ___scrt_is_nonwritable_in_current_image 96665->96666 96673 f02f5e EnterCriticalSection 96666->96673 96668 f01eaa 96674 f01f31 96668->96674 96672 f01ec8 __wsopen_s 96672->96664 96673->96668 96675 f01f51 96674->96675 96678 f01f59 96674->96678 96676 ef0a8c CatchGuardHandler 5 API calls 96675->96676 96677 f01eb7 96676->96677 96680 f01ed5 LeaveCriticalSection _abort 96677->96680 96678->96675 96679 f029c8 _free 20 API calls 96678->96679 96679->96675 96680->96672 96681->96643 96683 f03631 96682->96683 96684 f03627 96682->96684 96689 f02fd7 5 API calls 2 library calls 96683->96689 96686 ef0a8c CatchGuardHandler 5 API calls 96684->96686 96687 ef4cf2 96686->96687 96687->96647 96687->96648 96688 f03648 96688->96684 96689->96688 96690 f12ba5 96691 ed2b25 96690->96691 96692 f12baf 96690->96692 96718 ed2b83 7 API calls 96691->96718 96736 ed3a5a 96692->96736 96695 f12bb8 96697 ed9cb3 22 API calls 96695->96697 96700 f12bc6 96697->96700 96699 ed2b2f 96709 ed2b44 96699->96709 96722 ed3837 96699->96722 96701 f12bf5 96700->96701 96702 f12bce 96700->96702 96705 ed33c6 22 API calls 96701->96705 96743 ed33c6 96702->96743 96707 f12bf1 GetForegroundWindow ShellExecuteW 96705->96707 96714 f12c26 96707->96714 96708 ed2b5f 96716 ed2b66 SetCurrentDirectoryW 96708->96716 96709->96708 96732 ed30f2 96709->96732 96713 f12be7 96715 ed33c6 22 API calls 96713->96715 96714->96708 96715->96707 96717 ed2b7a 96716->96717 96753 ed2cd4 7 API calls 96718->96753 96720 ed2b2a 96721 ed2c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 96720->96721 96721->96699 96723 ed3862 ___scrt_fastfail 96722->96723 96754 ed4212 96723->96754 96726 ed38e8 96728 f13386 Shell_NotifyIconW 96726->96728 96729 ed3906 Shell_NotifyIconW 96726->96729 96758 ed3923 96729->96758 96731 ed391c 96731->96709 96733 ed3154 96732->96733 96734 ed3104 ___scrt_fastfail 96732->96734 96733->96708 96735 ed3123 Shell_NotifyIconW 96734->96735 96735->96733 96737 f11f50 __wsopen_s 96736->96737 96738 ed3a67 GetModuleFileNameW 96737->96738 96739 ed9cb3 22 API calls 96738->96739 96740 ed3a8d 96739->96740 96741 ed3aa2 23 API calls 96740->96741 96742 ed3a97 96741->96742 96742->96695 96744 ed33dd 96743->96744 96745 f130bb 96743->96745 96789 ed33ee 96744->96789 96747 eefddb 22 API calls 96745->96747 96749 f130c5 _wcslen 96747->96749 96748 ed33e8 96752 ed6350 22 API calls 96748->96752 96750 eefe0b 22 API calls 96749->96750 96751 f130fe __fread_nolock 96750->96751 96752->96713 96753->96720 96755 f135a4 96754->96755 96756 ed38b7 96754->96756 96755->96756 96757 f135ad DestroyIcon 96755->96757 96756->96726 96780 f3c874 42 API calls _strftime 96756->96780 96757->96756 96759 ed393f 96758->96759 96778 ed3a13 96758->96778 96781 ed6270 96759->96781 96762 f13393 LoadStringW 96765 f133ad 96762->96765 96763 ed395a 96764 ed6b57 22 API calls 96763->96764 96766 ed396f 96764->96766 96773 ed3994 ___scrt_fastfail 96765->96773 96787 eda8c7 22 API calls __fread_nolock 96765->96787 96767 ed397c 96766->96767 96768 f133c9 96766->96768 96767->96765 96770 ed3986 96767->96770 96788 ed6350 22 API calls 96768->96788 96786 ed6350 22 API calls 96770->96786 96776 ed39f9 Shell_NotifyIconW 96773->96776 96774 f133d7 96774->96773 96775 ed33c6 22 API calls 96774->96775 96777 f133f9 96775->96777 96776->96778 96779 ed33c6 22 API calls 96777->96779 96778->96731 96779->96773 96780->96726 96782 eefe0b 22 API calls 96781->96782 96783 ed6295 96782->96783 96784 eefddb 22 API calls 96783->96784 96785 ed394d 96784->96785 96785->96762 96785->96763 96786->96773 96787->96773 96788->96774 96790 ed33fe _wcslen 96789->96790 96791 f1311d 96790->96791 96792 ed3411 96790->96792 96794 eefddb 22 API calls 96791->96794 96799 eda587 96792->96799 96796 f13127 96794->96796 96795 ed341e __fread_nolock 96795->96748 96797 eefe0b 22 API calls 96796->96797 96798 f13157 __fread_nolock 96797->96798 96800 eda59d 96799->96800 96803 eda598 __fread_nolock 96799->96803 96801 f1f80f 96800->96801 96802 eefe0b 22 API calls 96800->96802 96802->96803 96803->96795 96804 ed1098 96809 ed42de 96804->96809 96808 ed10a7 96810 eda961 22 API calls 96809->96810 96811 ed42f5 GetVersionExW 96810->96811 96812 ed6b57 22 API calls 96811->96812 96813 ed4342 96812->96813 96814 ed93b2 22 API calls 96813->96814 96828 ed4378 96813->96828 96815 ed436c 96814->96815 96816 ed37a0 22 API calls 96815->96816 96816->96828 96817 ed441b GetCurrentProcess IsWow64Process 96818 ed4437 96817->96818 96819 ed444f LoadLibraryA 96818->96819 96820 f13824 GetSystemInfo 96818->96820 96821 ed449c GetSystemInfo 96819->96821 96822 ed4460 GetProcAddress 96819->96822 96823 ed4476 96821->96823 96822->96821 96825 ed4470 GetNativeSystemInfo 96822->96825 96826 ed447a FreeLibrary 96823->96826 96827 ed109d 96823->96827 96824 f137df 96825->96823 96826->96827 96829 ef00a3 29 API calls __onexit 96827->96829 96828->96817 96828->96824 96829->96808 96830 ed105b 96835 ed344d 96830->96835 96832 ed106a 96866 ef00a3 29 API calls __onexit 96832->96866 96834 ed1074 96836 ed345d __wsopen_s 96835->96836 96837 eda961 22 API calls 96836->96837 96838 ed3513 96837->96838 96839 ed3a5a 24 API calls 96838->96839 96840 ed351c 96839->96840 96867 ed3357 96840->96867 96843 ed33c6 22 API calls 96844 ed3535 96843->96844 96845 ed515f 22 API calls 96844->96845 96846 ed3544 96845->96846 96847 eda961 22 API calls 96846->96847 96848 ed354d 96847->96848 96849 eda6c3 22 API calls 96848->96849 96850 ed3556 RegOpenKeyExW 96849->96850 96851 f13176 RegQueryValueExW 96850->96851 96856 ed3578 96850->96856 96852 f13193 96851->96852 96853 f1320c RegCloseKey 96851->96853 96854 eefe0b 22 API calls 96852->96854 96853->96856 96861 f1321e _wcslen 96853->96861 96855 f131ac 96854->96855 96857 ed5722 22 API calls 96855->96857 96856->96832 96858 f131b7 RegQueryValueExW 96857->96858 96859 f131d4 96858->96859 96863 f131ee messages 96858->96863 96860 ed6b57 22 API calls 96859->96860 96860->96863 96861->96856 96862 ed4c6d 22 API calls 96861->96862 96864 ed9cb3 22 API calls 96861->96864 96865 ed515f 22 API calls 96861->96865 96862->96861 96863->96853 96864->96861 96865->96861 96866->96834 96868 f11f50 __wsopen_s 96867->96868 96869 ed3364 GetFullPathNameW 96868->96869 96870 ed3386 96869->96870 96871 ed6b57 22 API calls 96870->96871 96872 ed33a4 96871->96872 96872->96843 96873 ed2e37 96874 eda961 22 API calls 96873->96874 96875 ed2e4d 96874->96875 96952 ed4ae3 96875->96952 96877 ed2e6b 96878 ed3a5a 24 API calls 96877->96878 96879 ed2e7f 96878->96879 96880 ed9cb3 22 API calls 96879->96880 96881 ed2e8c 96880->96881 96882 ed4ecb 94 API calls 96881->96882 96883 ed2ea5 96882->96883 96884 ed2ead 96883->96884 96885 f12cb0 96883->96885 96966 eda8c7 22 API calls __fread_nolock 96884->96966 96886 f42cf9 80 API calls 96885->96886 96887 f12cc3 96886->96887 96888 f12ccf 96887->96888 96890 ed4f39 68 API calls 96887->96890 96893 ed4f39 68 API calls 96888->96893 96890->96888 96891 ed2ec3 96967 ed6f88 22 API calls 96891->96967 96896 f12ce5 96893->96896 96894 ed2ecf 96895 ed9cb3 22 API calls 96894->96895 96897 ed2edc 96895->96897 96984 ed3084 22 API calls 96896->96984 96968 eda81b 41 API calls 96897->96968 96900 f12d02 96985 ed3084 22 API calls 96900->96985 96901 ed2eec 96902 ed9cb3 22 API calls 96901->96902 96904 ed2f12 96902->96904 96969 eda81b 41 API calls 96904->96969 96905 f12d1e 96907 ed3a5a 24 API calls 96905->96907 96908 f12d44 96907->96908 96986 ed3084 22 API calls 96908->96986 96909 ed2f21 96912 eda961 22 API calls 96909->96912 96911 f12d50 96987 eda8c7 22 API calls __fread_nolock 96911->96987 96914 ed2f3f 96912->96914 96970 ed3084 22 API calls 96914->96970 96916 f12d5e 96988 ed3084 22 API calls 96916->96988 96917 ed2f4b 96971 ef4a28 40 API calls 3 library calls 96917->96971 96920 f12d6d 96989 eda8c7 22 API calls __fread_nolock 96920->96989 96921 ed2f59 96921->96896 96922 ed2f63 96921->96922 96972 ef4a28 40 API calls 3 library calls 96922->96972 96925 f12d83 96990 ed3084 22 API calls 96925->96990 96926 ed2f6e 96926->96900 96928 ed2f78 96926->96928 96973 ef4a28 40 API calls 3 library calls 96928->96973 96929 f12d90 96931 ed2f83 96931->96905 96932 ed2f8d 96931->96932 96974 ef4a28 40 API calls 3 library calls 96932->96974 96934 ed2f98 96935 ed2fdc 96934->96935 96975 ed3084 22 API calls 96934->96975 96935->96920 96936 ed2fe8 96935->96936 96936->96929 96978 ed63eb 22 API calls 96936->96978 96938 ed2fbf 96976 eda8c7 22 API calls __fread_nolock 96938->96976 96941 ed2ff8 96979 ed6a50 22 API calls 96941->96979 96942 ed2fcd 96977 ed3084 22 API calls 96942->96977 96945 ed3006 96980 ed70b0 23 API calls 96945->96980 96949 ed3021 96950 ed3065 96949->96950 96981 ed6f88 22 API calls 96949->96981 96982 ed70b0 23 API calls 96949->96982 96983 ed3084 22 API calls 96949->96983 96953 ed4af0 __wsopen_s 96952->96953 96954 ed6b57 22 API calls 96953->96954 96955 ed4b22 96953->96955 96954->96955 96962 ed4b58 96955->96962 96991 ed4c6d 96955->96991 96957 ed9cb3 22 API calls 96959 ed4c52 96957->96959 96958 ed9cb3 22 API calls 96958->96962 96961 ed515f 22 API calls 96959->96961 96960 ed4c6d 22 API calls 96960->96962 96964 ed4c5e 96961->96964 96962->96958 96962->96960 96963 ed515f 22 API calls 96962->96963 96965 ed4c29 96962->96965 96963->96962 96964->96877 96965->96957 96965->96964 96966->96891 96967->96894 96968->96901 96969->96909 96970->96917 96971->96921 96972->96926 96973->96931 96974->96934 96975->96938 96976->96942 96977->96935 96978->96941 96979->96945 96980->96949 96981->96949 96982->96949 96983->96949 96984->96900 96985->96905 96986->96911 96987->96916 96988->96920 96989->96925 96990->96929 96992 edaec9 22 API calls 96991->96992 96993 ed4c78 96992->96993 96993->96955 96994 ed3156 96997 ed3170 96994->96997 96998 ed3187 96997->96998 96999 ed318c 96998->96999 97000 ed31eb 96998->97000 97037 ed31e9 96998->97037 97004 ed3199 96999->97004 97005 ed3265 PostQuitMessage 96999->97005 97002 f12dfb 97000->97002 97003 ed31f1 97000->97003 97001 ed31d0 DefWindowProcW 97029 ed316a 97001->97029 97052 ed18e2 10 API calls 97002->97052 97006 ed321d SetTimer RegisterWindowMessageW 97003->97006 97007 ed31f8 97003->97007 97009 ed31a4 97004->97009 97010 f12e7c 97004->97010 97005->97029 97014 ed3246 CreatePopupMenu 97006->97014 97006->97029 97011 ed3201 KillTimer 97007->97011 97012 f12d9c 97007->97012 97015 ed31ae 97009->97015 97016 f12e68 97009->97016 97055 f3bf30 34 API calls ___scrt_fastfail 97010->97055 97020 ed30f2 Shell_NotifyIconW 97011->97020 97018 f12da1 97012->97018 97019 f12dd7 MoveWindow 97012->97019 97013 f12e1c 97053 eee499 42 API calls 97013->97053 97014->97029 97023 ed31b9 97015->97023 97024 f12e4d 97015->97024 97042 f3c161 97016->97042 97026 f12da7 97018->97026 97027 f12dc6 SetFocus 97018->97027 97019->97029 97028 ed3214 97020->97028 97030 ed31c4 97023->97030 97031 ed3253 97023->97031 97024->97001 97054 f30ad7 22 API calls 97024->97054 97025 f12e8e 97025->97001 97025->97029 97026->97030 97032 f12db0 97026->97032 97027->97029 97049 ed3c50 DeleteObject DestroyWindow 97028->97049 97030->97001 97039 ed30f2 Shell_NotifyIconW 97030->97039 97050 ed326f 44 API calls ___scrt_fastfail 97031->97050 97051 ed18e2 10 API calls 97032->97051 97037->97001 97038 ed3263 97038->97029 97040 f12e41 97039->97040 97041 ed3837 49 API calls 97040->97041 97041->97037 97043 f3c276 97042->97043 97044 f3c179 ___scrt_fastfail 97042->97044 97043->97029 97045 ed3923 24 API calls 97044->97045 97047 f3c1a0 97045->97047 97046 f3c25f KillTimer SetTimer 97046->97043 97047->97046 97048 f3c251 Shell_NotifyIconW 97047->97048 97048->97046 97049->97029 97050->97038 97051->97029 97052->97013 97053->97030 97054->97037 97055->97025 97056 ed1033 97061 ed4c91 97056->97061 97060 ed1042 97062 eda961 22 API calls 97061->97062 97063 ed4cff 97062->97063 97069 ed3af0 97063->97069 97066 ed4d9c 97067 ed1038 97066->97067 97072 ed51f7 22 API calls __fread_nolock 97066->97072 97068 ef00a3 29 API calls __onexit 97067->97068 97068->97060 97073 ed3b1c 97069->97073 97072->97066 97074 ed3b0f 97073->97074 97075 ed3b29 97073->97075 97074->97066 97075->97074 97076 ed3b30 RegOpenKeyExW 97075->97076 97076->97074 97077 ed3b4a RegQueryValueExW 97076->97077 97078 ed3b6b 97077->97078 97079 ed3b80 RegCloseKey 97077->97079 97078->97079 97079->97074

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 389 ed42de-ed434d call eda961 GetVersionExW call ed6b57 394 f13617-f1362a 389->394 395 ed4353 389->395 396 f1362b-f1362f 394->396 397 ed4355-ed4357 395->397 398 f13631 396->398 399 f13632-f1363e 396->399 400 ed435d-ed43bc call ed93b2 call ed37a0 397->400 401 f13656 397->401 398->399 399->396 402 f13640-f13642 399->402 417 f137df-f137e6 400->417 418 ed43c2-ed43c4 400->418 406 f1365d-f13660 401->406 402->397 405 f13648-f1364f 402->405 405->394 408 f13651 405->408 409 ed441b-ed4435 GetCurrentProcess IsWow64Process 406->409 410 f13666-f136a8 406->410 408->401 413 ed4494-ed449a 409->413 414 ed4437 409->414 410->409 411 f136ae-f136b1 410->411 415 f136b3-f136bd 411->415 416 f136db-f136e5 411->416 419 ed443d-ed4449 413->419 414->419 420 f136ca-f136d6 415->420 421 f136bf-f136c5 415->421 423 f136e7-f136f3 416->423 424 f136f8-f13702 416->424 425 f13806-f13809 417->425 426 f137e8 417->426 418->406 422 ed43ca-ed43dd 418->422 427 ed444f-ed445e LoadLibraryA 419->427 428 f13824-f13828 GetSystemInfo 419->428 420->409 421->409 429 f13726-f1372f 422->429 430 ed43e3-ed43e5 422->430 423->409 432 f13715-f13721 424->432 433 f13704-f13710 424->433 434 f137f4-f137fc 425->434 435 f1380b-f1381a 425->435 431 f137ee 426->431 436 ed449c-ed44a6 GetSystemInfo 427->436 437 ed4460-ed446e GetProcAddress 427->437 441 f13731-f13737 429->441 442 f1373c-f13748 429->442 439 ed43eb-ed43ee 430->439 440 f1374d-f13762 430->440 431->434 432->409 433->409 434->425 435->431 443 f1381c-f13822 435->443 438 ed4476-ed4478 436->438 437->436 444 ed4470-ed4474 GetNativeSystemInfo 437->444 445 ed447a-ed447b FreeLibrary 438->445 446 ed4481-ed4493 438->446 447 f13791-f13794 439->447 448 ed43f4-ed440f 439->448 449 f13764-f1376a 440->449 450 f1376f-f1377b 440->450 441->409 442->409 443->434 444->438 445->446 447->409 451 f1379a-f137c1 447->451 452 f13780-f1378c 448->452 453 ed4415 448->453 449->409 450->409 454 f137c3-f137c9 451->454 455 f137ce-f137da 451->455 452->409 453->409 454->409 455->409
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetVersionExW.KERNEL32(?), ref: 00ED430D
                                                                                                                                                                                                    • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(?,00F6CB64,00000000,?,?), ref: 00ED4422
                                                                                                                                                                                                  • IsWow64Process.KERNEL32(00000000,?,?), ref: 00ED4429
                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00ED4454
                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00ED4466
                                                                                                                                                                                                  • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00ED4474
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?), ref: 00ED447B
                                                                                                                                                                                                  • GetSystemInfo.KERNEL32(?,?,?), ref: 00ED44A0
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                                                                                                                  • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                                                                                                                  • API String ID: 3290436268-3101561225
                                                                                                                                                                                                  • Opcode ID: 3cd03ceaf0122f5fc882e305d61f22d3c00c4b7822fa8e5a446363e96910b41f
                                                                                                                                                                                                  • Instruction ID: 00e491065a476b696d574c21639bc5ef53ab61cd30a2a7667c817296d0a8f651
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3cd03ceaf0122f5fc882e305d61f22d3c00c4b7822fa8e5a446363e96910b41f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 98A191E191A3CCDFCF11CFA9B8401E53EA4BB37344F0A589AD091A7BA2D6704549FB61

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 793 ed42a2-ed42ba CreateStreamOnHGlobal 794 ed42bc-ed42d3 FindResourceExW 793->794 795 ed42da-ed42dd 793->795 796 ed42d9 794->796 797 f135ba-f135c9 LoadResource 794->797 796->795 797->796 798 f135cf-f135dd SizeofResource 797->798 798->796 799 f135e3-f135ee LockResource 798->799 799->796 800 f135f4-f13612 799->800 800->796
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00ED50AA,?,?,00000000,00000000), ref: 00ED42B2
                                                                                                                                                                                                  • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00ED50AA,?,?,00000000,00000000), ref: 00ED42C9
                                                                                                                                                                                                  • LoadResource.KERNEL32(?,00000000,?,?,00ED50AA,?,?,00000000,00000000,?,?,?,?,?,?,00ED4F20), ref: 00F135BE
                                                                                                                                                                                                  • SizeofResource.KERNEL32(?,00000000,?,?,00ED50AA,?,?,00000000,00000000,?,?,?,?,?,?,00ED4F20), ref: 00F135D3
                                                                                                                                                                                                  • LockResource.KERNEL32(00ED50AA,?,?,00ED50AA,?,?,00000000,00000000,?,?,?,?,?,?,00ED4F20,?), ref: 00F135E6
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                                                                                                  • String ID: SCRIPT
                                                                                                                                                                                                  • API String ID: 3051347437-3967369404
                                                                                                                                                                                                  • Opcode ID: 560a92659011197e59ba6df225db8a6d2de5af5706a45dd5c96064ca2bf7b772
                                                                                                                                                                                                  • Instruction ID: 8af8d8d6ac7de4ef1dcaa0e64b155c408eddf46a2a43ca1fa167bfc0bea35c6b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 560a92659011197e59ba6df225db8a6d2de5af5706a45dd5c96064ca2bf7b772
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1411CEB0200305BFE7219B65DC48F677BBAEBC5B51F10416AF896D62A0DBB1DC00A6B0

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00ED2B6B
                                                                                                                                                                                                    • Part of subcall function 00ED3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00FA1418,?,00ED2E7F,?,?,?,00000000), ref: 00ED3A78
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                  • GetForegroundWindow.USER32(runas,?,?,?,?,?,00F92224), ref: 00F12C10
                                                                                                                                                                                                  • ShellExecuteW.SHELL32(00000000,?,?,00F92224), ref: 00F12C17
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                                                                                                                                                  • String ID: runas
                                                                                                                                                                                                  • API String ID: 448630720-4000483414
                                                                                                                                                                                                  • Opcode ID: 7b007e58e92ba1e45058eaac2719a742f7a406aba43fe499aea564aedfb86ef0
                                                                                                                                                                                                  • Instruction ID: c160ed09f051672fa0c23f4ef41172c90771e8649363398dbe1c9c548e3540d5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7b007e58e92ba1e45058eaac2719a742f7a406aba43fe499aea564aedfb86ef0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0611D5312082055AD704FF74DC519BEB7E4EBA6744F04242FF192622A3CF618A4BA713

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00F3D501
                                                                                                                                                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 00F3D50F
                                                                                                                                                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 00F3D52F
                                                                                                                                                                                                  • CloseHandle.KERNELBASE(00000000), ref: 00F3D5DC
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 420147892-0
                                                                                                                                                                                                  • Opcode ID: 5a907974488e813bb2110aa16a22ac5dfb2eec2ff606cd1c66961c8b59868409
                                                                                                                                                                                                  • Instruction ID: bee6531d30915fc3867704e3ac46e517b42fff41f1fa964fe0df569900bc711f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5a907974488e813bb2110aa16a22ac5dfb2eec2ff606cd1c66961c8b59868409
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8331A1721083009FD304EF54DC81AAFBBE8EF99364F14052DF591972A2EB719A45DB92

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 993 f3dbbe-f3dbda lstrlenW 994 f3dc06 993->994 995 f3dbdc-f3dbe6 GetFileAttributesW 993->995 996 f3dc09-f3dc0d 994->996 995->996 997 f3dbe8-f3dbf7 FindFirstFileW 995->997 997->994 998 f3dbf9-f3dc04 FindClose 997->998 998->996
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenW.KERNEL32(?,00F15222), ref: 00F3DBCE
                                                                                                                                                                                                  • GetFileAttributesW.KERNELBASE(?), ref: 00F3DBDD
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00F3DBEE
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00F3DBFA
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2695905019-0
                                                                                                                                                                                                  • Opcode ID: f47ec385111873d81f740e11a46a818f080b767212e26765c5cd19df1fd2a92d
                                                                                                                                                                                                  • Instruction ID: 1249c9c11922e080fa1de46bdfd40c7bf722a0a9f5bbf3a37fc3a6ac7254308a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f47ec385111873d81f740e11a46a818f080b767212e26765c5cd19df1fd2a92d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 87F0ED718209186782206B7CBC0D8BA77AC9E02374F105702F8F6C20F0EBF09D94E6D6
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00F028E9,?,00EF4CBE,00F028E9,00F988B8,0000000C,00EF4E15,00F028E9,00000002,00000000,?,00F028E9), ref: 00EF4D09
                                                                                                                                                                                                  • TerminateProcess.KERNEL32(00000000,?,00EF4CBE,00F028E9,00F988B8,0000000C,00EF4E15,00F028E9,00000002,00000000,?,00F028E9), ref: 00EF4D10
                                                                                                                                                                                                  • ExitProcess.KERNEL32 ref: 00EF4D22
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1703294689-0
                                                                                                                                                                                                  • Opcode ID: 0caf00d071689251cf5b030c0adb1461a6de6b156841bffa2a70e3d19a08e14a
                                                                                                                                                                                                  • Instruction ID: 62b9f682de89c9536fd0e214722692762812aabd684289eeb6a08c61b97a9c3c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0caf00d071689251cf5b030c0adb1461a6de6b156841bffa2a70e3d19a08e14a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 34E0B6B100014CABDF11AF54DD0AA6A3F69EB85785B104014FDA59A262DB76DD42EA80

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 0 f5aff9-f5b056 call ef2340 3 f5b094-f5b098 0->3 4 f5b058-f5b06b call edb567 0->4 6 f5b0dd-f5b0e0 3->6 7 f5b09a-f5b0bb call edb567 * 2 3->7 12 f5b06d-f5b092 call edb567 * 2 4->12 13 f5b0c8 4->13 9 f5b0f5-f5b119 call ed7510 call ed7620 6->9 10 f5b0e2-f5b0e5 6->10 29 f5b0bf-f5b0c4 7->29 31 f5b11f-f5b178 call ed7510 call ed7620 call ed7510 call ed7620 call ed7510 call ed7620 9->31 32 f5b1d8-f5b1e0 9->32 14 f5b0e8-f5b0ed call edb567 10->14 12->29 17 f5b0cb-f5b0cf 13->17 14->9 23 f5b0d1-f5b0d7 17->23 24 f5b0d9-f5b0db 17->24 23->14 24->6 24->9 29->6 33 f5b0c6 29->33 82 f5b1a6-f5b1d6 GetSystemDirectoryW call eefe0b GetSystemDirectoryW 31->82 83 f5b17a-f5b195 call ed7510 call ed7620 31->83 36 f5b1e2-f5b1fd call ed7510 call ed7620 32->36 37 f5b20a-f5b238 GetCurrentDirectoryW call eefe0b GetCurrentDirectoryW 32->37 33->17 36->37 53 f5b1ff-f5b208 call ef4963 36->53 45 f5b23c 37->45 48 f5b240-f5b244 45->48 51 f5b275-f5b285 call f400d9 48->51 52 f5b246-f5b270 call ed9c6e * 3 48->52 62 f5b287-f5b289 51->62 63 f5b28b-f5b2e1 call f407c0 call f406e6 call f405a7 51->63 52->51 53->37 53->51 66 f5b2ee-f5b2f2 62->66 63->66 98 f5b2e3 63->98 71 f5b2f8-f5b321 call f311c8 66->71 72 f5b39a-f5b3be CreateProcessW 66->72 87 f5b323-f5b328 call f31201 71->87 88 f5b32a call f314ce 71->88 76 f5b3c1-f5b3d4 call eefe14 * 2 72->76 103 f5b3d6-f5b3e8 76->103 104 f5b42f-f5b43d CloseHandle 76->104 82->45 83->82 105 f5b197-f5b1a0 call ef4963 83->105 97 f5b32f-f5b33c call ef4963 87->97 88->97 113 f5b347-f5b357 call ef4963 97->113 114 f5b33e-f5b345 97->114 98->66 109 f5b3ed-f5b3fc 103->109 110 f5b3ea 103->110 107 f5b49c 104->107 108 f5b43f-f5b444 104->108 105->48 105->82 111 f5b4a0-f5b4a4 107->111 115 f5b446-f5b44c CloseHandle 108->115 116 f5b451-f5b456 108->116 117 f5b401-f5b42a GetLastError call ed630c call edcfa0 109->117 118 f5b3fe 109->118 110->109 120 f5b4a6-f5b4b0 111->120 121 f5b4b2-f5b4bc 111->121 136 f5b362-f5b372 call ef4963 113->136 137 f5b359-f5b360 113->137 114->113 114->114 115->116 124 f5b463-f5b468 116->124 125 f5b458-f5b45e CloseHandle 116->125 127 f5b4e5-f5b4f6 call f40175 117->127 118->117 120->127 128 f5b4c4-f5b4e3 call edcfa0 CloseHandle 121->128 129 f5b4be 121->129 131 f5b475-f5b49a call f409d9 call f5b536 124->131 132 f5b46a-f5b470 CloseHandle 124->132 125->124 128->127 129->128 131->111 132->131 146 f5b374-f5b37b 136->146 147 f5b37d-f5b398 call eefe14 * 3 136->147 137->136 137->137 146->146 146->147 147->76
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F5B198
                                                                                                                                                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F5B1B0
                                                                                                                                                                                                  • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00F5B1D4
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F5B200
                                                                                                                                                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F5B214
                                                                                                                                                                                                  • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00F5B236
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F5B332
                                                                                                                                                                                                    • Part of subcall function 00F405A7: GetStdHandle.KERNEL32(000000F6), ref: 00F405C6
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F5B34B
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F5B366
                                                                                                                                                                                                  • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F5B3B6
                                                                                                                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F5B407
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00F5B439
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F5B44A
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F5B45C
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F5B46E
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00F5B4E3
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2178637699-0
                                                                                                                                                                                                  • Opcode ID: f3281e0c7ff99c5fb2c47f380fef0c147ff2c518aac95f71bb4ea564f74d749c
                                                                                                                                                                                                  • Instruction ID: 636014845b5027e986bf4090dfd926e34937bab5010b86cacfc3c11b24b5ef55
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f3281e0c7ff99c5fb2c47f380fef0c147ff2c518aac95f71bb4ea564f74d749c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C3F18D316083409FC724EF24C891B6EBBE5EF85320F14855EF9959B2A2DB31EC45DB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetInputState.USER32 ref: 00EDD807
                                                                                                                                                                                                  • timeGetTime.WINMM ref: 00EDDA07
                                                                                                                                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EDDB28
                                                                                                                                                                                                  • TranslateMessage.USER32(?), ref: 00EDDB7B
                                                                                                                                                                                                  • DispatchMessageW.USER32(?), ref: 00EDDB89
                                                                                                                                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EDDB9F
                                                                                                                                                                                                  • Sleep.KERNELBASE(0000000A), ref: 00EDDBB1
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2189390790-0
                                                                                                                                                                                                  • Opcode ID: 1654880738434bccf5a3fa6cbf26f3d49154295359368ae42f44665e2de16e95
                                                                                                                                                                                                  • Instruction ID: 207e62842f14a046884552d59db09e19937d4d48b6288ca42e73567b55d6c46a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1654880738434bccf5a3fa6cbf26f3d49154295359368ae42f44665e2de16e95
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AA422330608345EFD728CF24CC94BAAB7E0FF86314F14951AE495A7391D7B5E845EB82

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00ED2D07
                                                                                                                                                                                                  • RegisterClassExW.USER32(00000030), ref: 00ED2D31
                                                                                                                                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00ED2D42
                                                                                                                                                                                                  • InitCommonControlsEx.COMCTL32(?), ref: 00ED2D5F
                                                                                                                                                                                                  • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00ED2D6F
                                                                                                                                                                                                  • LoadIconW.USER32(000000A9), ref: 00ED2D85
                                                                                                                                                                                                  • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00ED2D94
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                                                                                                  • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                                                                                                  • API String ID: 2914291525-1005189915
                                                                                                                                                                                                  • Opcode ID: 47dd2edd4a8c69bb65bc8fe7852d04f9ae87575a4b6376c4ec27e8b9dbec219b
                                                                                                                                                                                                  • Instruction ID: c5c8e3a241ef32947d380e91c032389df242839fd7f11a771a88117faa567bcb
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 47dd2edd4a8c69bb65bc8fe7852d04f9ae87575a4b6376c4ec27e8b9dbec219b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3A21F4B590131CAFDB00DFA4EC49BEEBBB8FB09700F00411AF5A1A62A0D7B54544EF91

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 457 f1065b-f1068b call f1042f 460 f106a6-f106b2 call f05221 457->460 461 f1068d-f10698 call eff2c6 457->461 466 f106b4-f106c9 call eff2c6 call eff2d9 460->466 467 f106cb-f10714 call f1039a 460->467 468 f1069a-f106a1 call eff2d9 461->468 466->468 477 f10781-f1078a GetFileType 467->477 478 f10716-f1071f 467->478 475 f1097d-f10983 468->475 479 f107d3-f107d6 477->479 480 f1078c-f107bd GetLastError call eff2a3 CloseHandle 477->480 482 f10721-f10725 478->482 483 f10756-f1077c GetLastError call eff2a3 478->483 486 f107d8-f107dd 479->486 487 f107df-f107e5 479->487 480->468 496 f107c3-f107ce call eff2d9 480->496 482->483 488 f10727-f10754 call f1039a 482->488 483->468 491 f107e9-f10837 call f0516a 486->491 487->491 492 f107e7 487->492 488->477 488->483 499 f10847-f1086b call f1014d 491->499 500 f10839-f10845 call f105ab 491->500 492->491 496->468 507 f1086d 499->507 508 f1087e-f108c1 499->508 500->499 506 f1086f-f10879 call f086ae 500->506 506->475 507->506 510 f108c3-f108c7 508->510 511 f108e2-f108f0 508->511 510->511 515 f108c9-f108dd 510->515 512 f108f6-f108fa 511->512 513 f1097b 511->513 512->513 516 f108fc-f1092f CloseHandle call f1039a 512->516 513->475 515->511 519 f10931-f1095d GetLastError call eff2a3 call f05333 516->519 520 f10963-f10977 516->520 519->520 520->513
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F1039A: CreateFileW.KERNELBASE(00000000,00000000,?,00F10704,?,?,00000000,?,00F10704,00000000,0000000C), ref: 00F103B7
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00F1076F
                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00F10776
                                                                                                                                                                                                  • GetFileType.KERNELBASE(00000000), ref: 00F10782
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00F1078C
                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00F10795
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F107B5
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00F108FF
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00F10931
                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00F10938
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                                                  • String ID: H
                                                                                                                                                                                                  • API String ID: 4237864984-2852464175
                                                                                                                                                                                                  • Opcode ID: bf5ae7d5676c55c03b1a017af04aa30116dc26f1cc0522b919d5bde44b0130a4
                                                                                                                                                                                                  • Instruction ID: 30ec62326357c2735b464c7689ca00a2a3685b12ff0e9b329ee5766997e52f0f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: bf5ae7d5676c55c03b1a017af04aa30116dc26f1cc0522b919d5bde44b0130a4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F1A11632A041088FDF19AF68DC51BEE7BA0EF46320F140159F855AB3D1DB759C92EB91

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED3A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00FA1418,?,00ED2E7F,?,?,?,00000000), ref: 00ED3A78
                                                                                                                                                                                                    • Part of subcall function 00ED3357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00ED3379
                                                                                                                                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00ED356A
                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00F1318D
                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00F131CE
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00F13210
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F13277
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F13286
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                                                                                                                  • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                                                                                                                  • API String ID: 98802146-2727554177
                                                                                                                                                                                                  • Opcode ID: f9440f6c363d60a8d374d469973c2eb4352ec9d7a33803c1245e63007c9b22a6
                                                                                                                                                                                                  • Instruction ID: a4137bda74126e47c7f5ae2e34fe3c4db52471bf934b1cca7435c4aef637ea37
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f9440f6c363d60a8d374d469973c2eb4352ec9d7a33803c1245e63007c9b22a6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F871E6B16043049FC744EF69DC419ABBBE8FF87740F40142EF584932A1EB749A49EB52

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00ED2B8E
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00ED2B9D
                                                                                                                                                                                                  • LoadIconW.USER32(00000063), ref: 00ED2BB3
                                                                                                                                                                                                  • LoadIconW.USER32(000000A4), ref: 00ED2BC5
                                                                                                                                                                                                  • LoadIconW.USER32(000000A2), ref: 00ED2BD7
                                                                                                                                                                                                  • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00ED2BEF
                                                                                                                                                                                                  • RegisterClassExW.USER32(?), ref: 00ED2C40
                                                                                                                                                                                                    • Part of subcall function 00ED2CD4: GetSysColorBrush.USER32(0000000F), ref: 00ED2D07
                                                                                                                                                                                                    • Part of subcall function 00ED2CD4: RegisterClassExW.USER32(00000030), ref: 00ED2D31
                                                                                                                                                                                                    • Part of subcall function 00ED2CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00ED2D42
                                                                                                                                                                                                    • Part of subcall function 00ED2CD4: InitCommonControlsEx.COMCTL32(?), ref: 00ED2D5F
                                                                                                                                                                                                    • Part of subcall function 00ED2CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00ED2D6F
                                                                                                                                                                                                    • Part of subcall function 00ED2CD4: LoadIconW.USER32(000000A9), ref: 00ED2D85
                                                                                                                                                                                                    • Part of subcall function 00ED2CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00ED2D94
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                                                                                                  • String ID: #$0$AutoIt v3
                                                                                                                                                                                                  • API String ID: 423443420-4155596026
                                                                                                                                                                                                  • Opcode ID: bda8a68fd231681fd465f5a5ad3532d20bdecd6ce76c386d2daeb4eda8041c58
                                                                                                                                                                                                  • Instruction ID: 5a881aafdd05fe3bec2bab2921c3f54809955768ec0fa832f92c02bcf11405e0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: bda8a68fd231681fd465f5a5ad3532d20bdecd6ce76c386d2daeb4eda8041c58
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 362129B4E0032CAFDF109FA5EC55AAA7FF8FB49B50F05001AE644A66A0D7F10940EF90

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 598 ed3170-ed3185 599 ed31e5-ed31e7 598->599 600 ed3187-ed318a 598->600 599->600 601 ed31e9 599->601 602 ed318c-ed3193 600->602 603 ed31eb 600->603 604 ed31d0-ed31d8 DefWindowProcW 601->604 607 ed3199-ed319e 602->607 608 ed3265-ed326d PostQuitMessage 602->608 605 f12dfb-f12e23 call ed18e2 call eee499 603->605 606 ed31f1-ed31f6 603->606 615 ed31de-ed31e4 604->615 644 f12e28-f12e2f 605->644 610 ed321d-ed3244 SetTimer RegisterWindowMessageW 606->610 611 ed31f8-ed31fb 606->611 613 ed31a4-ed31a8 607->613 614 f12e7c-f12e90 call f3bf30 607->614 609 ed3219-ed321b 608->609 609->615 610->609 619 ed3246-ed3251 CreatePopupMenu 610->619 616 ed3201-ed320f KillTimer call ed30f2 611->616 617 f12d9c-f12d9f 611->617 620 ed31ae-ed31b3 613->620 621 f12e68-f12e72 call f3c161 613->621 614->609 639 f12e96 614->639 634 ed3214 call ed3c50 616->634 623 f12da1-f12da5 617->623 624 f12dd7-f12df6 MoveWindow 617->624 619->609 628 ed31b9-ed31be 620->628 629 f12e4d-f12e54 620->629 635 f12e77 621->635 631 f12da7-f12daa 623->631 632 f12dc6-f12dd2 SetFocus 623->632 624->609 637 ed31c4-ed31ca 628->637 638 ed3253-ed3263 call ed326f 628->638 629->604 633 f12e5a-f12e63 call f30ad7 629->633 631->637 640 f12db0-f12dc1 call ed18e2 631->640 632->609 633->604 634->609 635->609 637->604 637->644 638->609 639->604 640->609 644->604 648 f12e35-f12e48 call ed30f2 call ed3837 644->648 648->604
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00ED316A,?,?), ref: 00ED31D8
                                                                                                                                                                                                  • KillTimer.USER32(?,00000001,?,?,?,?,?,00ED316A,?,?), ref: 00ED3204
                                                                                                                                                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00ED3227
                                                                                                                                                                                                  • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00ED316A,?,?), ref: 00ED3232
                                                                                                                                                                                                  • CreatePopupMenu.USER32 ref: 00ED3246
                                                                                                                                                                                                  • PostQuitMessage.USER32(00000000), ref: 00ED3267
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                                                                                                  • String ID: TaskbarCreated
                                                                                                                                                                                                  • API String ID: 129472671-2362178303
                                                                                                                                                                                                  • Opcode ID: db882ac473b3cfef45c293664a6a1fa11ffd6bb26f8907f49952c6bafb4fd387
                                                                                                                                                                                                  • Instruction ID: 28b290a937d1a4f10baaf3091a29a2ae6abfc5a498a4c982acb353257063d01a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: db882ac473b3cfef45c293664a6a1fa11ffd6bb26f8907f49952c6bafb4fd387
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 39416B79A00209ABDF141FB8DC19BBA3A59F706354F042127F591A53F2C7B19A42F7A3

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 654 ed1410-ed1449 655 ed144f-ed1465 mciSendStringW 654->655 656 f124b8-f124b9 DestroyWindow 654->656 657 ed146b-ed1473 655->657 658 ed16c6-ed16d3 655->658 661 f124c4-f124d1 656->661 657->661 662 ed1479-ed1488 call ed182e 657->662 659 ed16f8-ed16ff 658->659 660 ed16d5-ed16f0 UnregisterHotKey 658->660 659->657 664 ed1705 659->664 660->659 663 ed16f2-ed16f3 call ed10d0 660->663 665 f12500-f12507 661->665 666 f124d3-f124d6 661->666 673 ed148e-ed1496 662->673 674 f1250e-f1251a 662->674 663->659 664->658 665->661 670 f12509 665->670 671 f124e2-f124e5 FindClose 666->671 672 f124d8-f124e0 call ed6246 666->672 670->674 675 f124eb-f124f8 671->675 672->675 677 ed149c-ed14c1 call edcfa0 673->677 678 f12532-f1253f 673->678 680 f12524-f1252b 674->680 681 f1251c-f1251e FreeLibrary 674->681 675->665 679 f124fa-f124fb call f432b1 675->679 691 ed14f8-ed1503 CoUninitialize 677->691 692 ed14c3 677->692 686 f12541-f1255e VirtualFree 678->686 687 f12566-f1256d 678->687 679->665 680->674 685 f1252d 680->685 681->680 685->678 686->687 690 f12560-f12561 call f43317 686->690 687->678 688 f1256f 687->688 694 f12574-f12578 688->694 690->687 691->694 696 ed1509-ed150e 691->696 695 ed14c6-ed14f6 call ed1a05 call ed19ae 692->695 694->696 697 f1257e-f12584 694->697 695->691 699 f12589-f12596 call f432eb 696->699 700 ed1514-ed151e 696->700 697->696 713 f12598 699->713 703 ed1524-ed15a5 call ed988f call ed1944 call ed17d5 call eefe14 call ed177c call ed988f call edcfa0 call ed17fe call eefe14 700->703 704 ed1707-ed1714 call eef80e 700->704 717 f1259d-f125bf call eefdcd 703->717 743 ed15ab-ed15cf call eefe14 703->743 704->703 715 ed171a 704->715 713->717 715->704 723 f125c1 717->723 725 f125c6-f125e8 call eefdcd 723->725 731 f125ea 725->731 734 f125ef-f12611 call eefdcd 731->734 740 f12613 734->740 744 f12618-f12625 call f364d4 740->744 743->725 749 ed15d5-ed15f9 call eefe14 743->749 750 f12627 744->750 749->734 755 ed15ff-ed1619 call eefe14 749->755 752 f1262c-f12639 call eeac64 750->752 758 f1263b 752->758 755->744 760 ed161f-ed1643 call ed17d5 call eefe14 755->760 761 f12640-f1264d call f43245 758->761 760->752 769 ed1649-ed1651 760->769 767 f1264f 761->767 771 f12654-f12661 call f432cc 767->771 769->761 770 ed1657-ed1675 call ed988f call ed190a 769->770 770->771 779 ed167b-ed1689 770->779 777 f12663 771->777 780 f12668-f12675 call f432cc 777->780 779->780 782 ed168f-ed16c5 call ed988f * 3 call ed1876 779->782 785 f12677 780->785 785->785
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00ED1459
                                                                                                                                                                                                  • CoUninitialize.COMBASE ref: 00ED14F8
                                                                                                                                                                                                  • UnregisterHotKey.USER32(?), ref: 00ED16DD
                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 00F124B9
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(?), ref: 00F1251E
                                                                                                                                                                                                  • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00F1254B
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                                                                                                  • String ID: close all
                                                                                                                                                                                                  • API String ID: 469580280-3243417748
                                                                                                                                                                                                  • Opcode ID: aedb317c05206f1ec46fc6da3243de230b6603dc63a7d2eafab8812b1883d0c9
                                                                                                                                                                                                  • Instruction ID: b8ddf9957aa5afc9dcea200ece9c4323ddff562e7f752f9c4f4b5588fa2dccbb
                                                                                                                                                                                                  • Opcode Fuzzy Hash: aedb317c05206f1ec46fc6da3243de230b6603dc63a7d2eafab8812b1883d0c9
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AFD178317012129FCB19EF55C895A69F7A1FF05710F1451AEE48A7B362CB30AD62DF90

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 803 ed2c63-ed2cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00ED2C91
                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00ED2CB2
                                                                                                                                                                                                  • ShowWindow.USER32(00000000,?,?,?,?,?,?,00ED1CAD,?), ref: 00ED2CC6
                                                                                                                                                                                                  • ShowWindow.USER32(00000000,?,?,?,?,?,?,00ED1CAD,?), ref: 00ED2CCF
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$CreateShow
                                                                                                                                                                                                  • String ID: AutoIt v3$edit
                                                                                                                                                                                                  • API String ID: 1584632944-3779509399
                                                                                                                                                                                                  • Opcode ID: b752f239e2aba365d7efdf5d34bb03210d0d6664fcb4f1468b801b3603b1714a
                                                                                                                                                                                                  • Instruction ID: da46b137d82dbfe9c7d08e46bd44e6a830a21fd04f9d693b5bd37a0788389e4f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b752f239e2aba365d7efdf5d34bb03210d0d6664fcb4f1468b801b3603b1714a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D7F0D0B55403987AEB311B176C08E773E7DE7C7F60F01005AF94093560C6A65850FAB0

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 954 ed3b1c-ed3b27 955 ed3b99-ed3b9b 954->955 956 ed3b29-ed3b2e 954->956 958 ed3b8c-ed3b8f 955->958 956->955 957 ed3b30-ed3b48 RegOpenKeyExW 956->957 957->955 959 ed3b4a-ed3b69 RegQueryValueExW 957->959 960 ed3b6b-ed3b76 959->960 961 ed3b80-ed3b8b RegCloseKey 959->961 962 ed3b78-ed3b7a 960->962 963 ed3b90-ed3b97 960->963 961->958 964 ed3b7e 962->964 963->964 964->961
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00ED3B0F,SwapMouseButtons,00000004,?), ref: 00ED3B40
                                                                                                                                                                                                  • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00ED3B0F,SwapMouseButtons,00000004,?), ref: 00ED3B61
                                                                                                                                                                                                  • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00ED3B0F,SwapMouseButtons,00000004,?), ref: 00ED3B83
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseOpenQueryValue
                                                                                                                                                                                                  • String ID: Control Panel\Mouse
                                                                                                                                                                                                  • API String ID: 3677997916-824357125
                                                                                                                                                                                                  • Opcode ID: d17665a55fc4710f1e6ae943ca658831537d73147829f6d2dea3ba5943510d51
                                                                                                                                                                                                  • Instruction ID: 35920966e5ede36dc31b62f969bccb0028282c7ec34538caabf1b758f06e8fb6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d17665a55fc4710f1e6ae943ca658831537d73147829f6d2dea3ba5943510d51
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A7112AB5510208FFDB208FA5DC44AEEBBB9EF04744B10546BE845E7210D2719E41A7A1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00F133A2
                                                                                                                                                                                                    • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                  • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00ED3A04
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                                                                                                                  • String ID: Line:
                                                                                                                                                                                                  • API String ID: 2289894680-1585850449
                                                                                                                                                                                                  • Opcode ID: 04dca192435552c4fa7ea7aba6ffff2c4b2e9b3ea2d0af84ef69d0227fa500f8
                                                                                                                                                                                                  • Instruction ID: 8c5b643ac63578b4b19d3bd0113f4d2773fe0866740e4e1eb557b722fcbadff0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 04dca192435552c4fa7ea7aba6ffff2c4b2e9b3ea2d0af84ef69d0227fa500f8
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4D31E571508304AAD724EB20DC45BEB73D8EB85714F00652BF599A2291DB709A4AD7D3
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00EF0668
                                                                                                                                                                                                    • Part of subcall function 00EF32A4: RaiseException.KERNEL32(?,?,?,00EF068A,?,00FA1444,?,?,?,?,?,?,00EF068A,00ED1129,00F98738,00ED1129), ref: 00EF3304
                                                                                                                                                                                                  • __CxxThrowException@8.LIBVCRUNTIME ref: 00EF0685
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                                                                                  • String ID: Unknown exception
                                                                                                                                                                                                  • API String ID: 3476068407-410509341
                                                                                                                                                                                                  • Opcode ID: 7fa5326ecc479245e1a746bfe6ab32bf11a9c0a0ccfef49ce52a95c9b9641a71
                                                                                                                                                                                                  • Instruction ID: 7813f1b3935daeb3e23f7c2eea9a08c68edaec5a612f2806ffafec034ec01ef7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7fa5326ecc479245e1a746bfe6ab32bf11a9c0a0ccfef49ce52a95c9b9641a71
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 86F0C23490020D778F10BAB5EC46DBE7BAC5E40354B606131FA18F69E3EF71EA26C681
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED1BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00ED1BF4
                                                                                                                                                                                                    • Part of subcall function 00ED1BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00ED1BFC
                                                                                                                                                                                                    • Part of subcall function 00ED1BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00ED1C07
                                                                                                                                                                                                    • Part of subcall function 00ED1BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00ED1C12
                                                                                                                                                                                                    • Part of subcall function 00ED1BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00ED1C1A
                                                                                                                                                                                                    • Part of subcall function 00ED1BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00ED1C22
                                                                                                                                                                                                    • Part of subcall function 00ED1B4A: RegisterWindowMessageW.USER32(00000004,?,00ED12C4), ref: 00ED1BA2
                                                                                                                                                                                                  • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00ED136A
                                                                                                                                                                                                  • OleInitialize.OLE32 ref: 00ED1388
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,00000000), ref: 00F124AB
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1986988660-0
                                                                                                                                                                                                  • Opcode ID: f12d5740574f7ef0f97172b5989b0f9f7673a2d0b9772ae36e6639fdbf63358d
                                                                                                                                                                                                  • Instruction ID: 2e9c35cca7e81863de44a73b2afc23ff67783ed1eaa658eb4d9406a51f689d75
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f12d5740574f7ef0f97172b5989b0f9f7673a2d0b9772ae36e6639fdbf63358d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A971ABF8D112188EC388EF79AD456653BE0FB8B384F1A922AD45AD7362EB344445FF50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED3923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00ED3A04
                                                                                                                                                                                                  • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00F3C259
                                                                                                                                                                                                  • KillTimer.USER32(?,00000001,?,?), ref: 00F3C261
                                                                                                                                                                                                  • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00F3C270
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: IconNotifyShell_Timer$Kill
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3500052701-0
                                                                                                                                                                                                  • Opcode ID: 4e1818bada5559bb1dad574d75a7ebb025e111636feee46549e71c8c89ebf314
                                                                                                                                                                                                  • Instruction ID: 98ca0f8dafb94404680100fa74f7219a2bfba50c69e76088f0af10512f23f645
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4e1818bada5559bb1dad574d75a7ebb025e111636feee46549e71c8c89ebf314
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8D31C571904344AFEB32DF748855BE7BBECAB06314F00049ED2EAA7241C7745A84EB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CloseHandle.KERNELBASE(00000000,00000000,?,?,00F085CC,?,00F98CC8,0000000C), ref: 00F08704
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00F085CC,?,00F98CC8,0000000C), ref: 00F0870E
                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00F08739
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2583163307-0
                                                                                                                                                                                                  • Opcode ID: 569334a323e4c01e2633bef8c8768795dce0acbd555c9eae6fcbbdea649670b7
                                                                                                                                                                                                  • Instruction ID: ac937184b03792d2a00609b4fca7fa2022481aee0a42d6fadc81d7584d368094
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 569334a323e4c01e2633bef8c8768795dce0acbd555c9eae6fcbbdea649670b7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 43014E33E056641AD6246334AC4577F7B4A4B92BF4F3A0119F8989B1D3DEE6CC83B690
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • TranslateMessage.USER32(?), ref: 00EDDB7B
                                                                                                                                                                                                  • DispatchMessageW.USER32(?), ref: 00EDDB89
                                                                                                                                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EDDB9F
                                                                                                                                                                                                  • Sleep.KERNELBASE(0000000A), ref: 00EDDBB1
                                                                                                                                                                                                  • TranslateAcceleratorW.USER32(?,?,?), ref: 00F21CC9
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3288985973-0
                                                                                                                                                                                                  • Opcode ID: de47a08f8a22359b227ff0c56194100629453b387f3245b05841326e13bbec97
                                                                                                                                                                                                  • Instruction ID: 639ef241d22202a6caee2a433e8881635eeeb372870da63d33b8c86a8a622449
                                                                                                                                                                                                  • Opcode Fuzzy Hash: de47a08f8a22359b227ff0c56194100629453b387f3245b05841326e13bbec97
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B7F082306483889BE734CB70DC49FEA73ACFB45314F10461AE69AD71C0DB749449EB55
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • __Init_thread_footer.LIBCMT ref: 00EE17F6
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Init_thread_footer
                                                                                                                                                                                                  • String ID: CALL
                                                                                                                                                                                                  • API String ID: 1385522511-4196123274
                                                                                                                                                                                                  • Opcode ID: 0e1f21466c2620c5ef097ef6d15abd2421b885e34a4fb5c1c4cba38d302120c9
                                                                                                                                                                                                  • Instruction ID: 27e1c6fd8adc6dea3f0b1b833000f773c61f9cf0a3d735c86ae7aac25b012273
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0e1f21466c2620c5ef097ef6d15abd2421b885e34a4fb5c1c4cba38d302120c9
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D6229D706083859FC714DF15C880B2ABBF1BF85314F18999DF496AB3A1D731E885DB82
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetOpenFileNameW.COMDLG32(?), ref: 00F12C8C
                                                                                                                                                                                                    • Part of subcall function 00ED3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00ED3A97,?,?,00ED2E7F,?,?,?,00000000), ref: 00ED3AC2
                                                                                                                                                                                                    • Part of subcall function 00ED2DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00ED2DC4
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Name$Path$FileFullLongOpen
                                                                                                                                                                                                  • String ID: X
                                                                                                                                                                                                  • API String ID: 779396738-3081909835
                                                                                                                                                                                                  • Opcode ID: 93c233d3e2a57f9787d7cdcb66e0e0ab7c5efbcea6745d5e1ee5718a97dc1b7f
                                                                                                                                                                                                  • Instruction ID: 8f16961d6a2bc79bb9ddd2832bcfac6a441b5d217da01adbc4799244590072aa
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 93c233d3e2a57f9787d7cdcb66e0e0ab7c5efbcea6745d5e1ee5718a97dc1b7f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5A218171A002589BDF41EF94C845BEE7BF8EF49314F00805AE545F7341DBB45A8A9BA1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00ED3908
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: IconNotifyShell_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1144537725-0
                                                                                                                                                                                                  • Opcode ID: ecfd0b8b6d3d4c42b50727488ecafc32bd4bd9ad059ebb9cd1fdb0836a242a3d
                                                                                                                                                                                                  • Instruction ID: c6026e7d1e66eca36e053f470e0669e60600b2dd93b249b327564beb24f31862
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ecfd0b8b6d3d4c42b50727488ecafc32bd4bd9ad059ebb9cd1fdb0836a242a3d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E83180B49043059FD720DF34D88579BBBE4FB49718F00092EF5A9A7390E7B1AA44DB52
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • timeGetTime.WINMM ref: 00EEF661
                                                                                                                                                                                                    • Part of subcall function 00EDD730: GetInputState.USER32 ref: 00EDD807
                                                                                                                                                                                                  • Sleep.KERNEL32(00000000), ref: 00F2F2DE
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: InputSleepStateTimetime
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4149333218-0
                                                                                                                                                                                                  • Opcode ID: 0a207d7f49aa8e3461dd73178a961c1f0157bc7dbcc716aac69814effeb87b23
                                                                                                                                                                                                  • Instruction ID: 89ef7aed5d4b1e6c03edfb704d63da2aa26adc334b2d9cd507059995df81759a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0a207d7f49aa8e3461dd73178a961c1f0157bc7dbcc716aac69814effeb87b23
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BEF0A731240205DFD310EF75E445B6AB7F9FF46760F00002AE899D7361DB70A800CB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED4E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00ED4EDD,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4E9C
                                                                                                                                                                                                    • Part of subcall function 00ED4E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00ED4EAE
                                                                                                                                                                                                    • Part of subcall function 00ED4E90: FreeLibrary.KERNEL32(00000000,?,?,00ED4EDD,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4EC0
                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4EFD
                                                                                                                                                                                                    • Part of subcall function 00ED4E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F13CDE,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4E62
                                                                                                                                                                                                    • Part of subcall function 00ED4E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00ED4E74
                                                                                                                                                                                                    • Part of subcall function 00ED4E59: FreeLibrary.KERNEL32(00000000,?,?,00F13CDE,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4E87
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Library$Load$AddressFreeProc
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2632591731-0
                                                                                                                                                                                                  • Opcode ID: b819e5d05b00d15e4ab15436fc6fd7a09fc9d8c1bb1c4fbc0fc4a7b12331b236
                                                                                                                                                                                                  • Instruction ID: 4175ca03a55af45c397abe26221549e4e004c4541d71944d5a6068baf4ed3100
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b819e5d05b00d15e4ab15436fc6fd7a09fc9d8c1bb1c4fbc0fc4a7b12331b236
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2411E372700205ABCB14AF60DC06FED77E5EF60710F10942FF582BA2E1EE709A46A790
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: __wsopen_s
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3347428461-0
                                                                                                                                                                                                  • Opcode ID: 6cfd2d44fac543b976c58c0512b3e24e468bb5489b5055c532f5afc232dc50ac
                                                                                                                                                                                                  • Instruction ID: 424dc775bc38a773b005005ec2e01a2879445bb4f800ede9b60f55b41c5bfa8a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6cfd2d44fac543b976c58c0512b3e24e468bb5489b5055c532f5afc232dc50ac
                                                                                                                                                                                                  • Instruction Fuzzy Hash: EE11187590410AAFCB05DF58E9419DE7BF5EF48354F104059F808AB352DA31DA12EBA5
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F04C7D: RtlAllocateHeap.NTDLL(00000008,00ED1129,00000000,?,00F02E29,00000001,00000364,?,?,?,00EFF2DE,00F03863,00FA1444,?,00EEFDF5,?), ref: 00F04CBE
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0506C
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AllocateHeap_free
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 614378929-0
                                                                                                                                                                                                  • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                  • Instruction ID: cc1b49b7f04f29951b7fb1dbc209fe0a4486a168f5f23f69867e2a81f619ae61
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 030126726047056BE3318E699C85A5AFBECFB89370F65091DE184832C0EA70A805EAB4
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                  • Instruction ID: f625f919e02dc374723603e98d465f5e489be8b7afcb919c07b0f423b462a72c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CCF04932500A1C96C6313E698C05BBA33D88F52334F110715F625F62E1CF78B802A5A5
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RtlAllocateHeap.NTDLL(00000008,00ED1129,00000000,?,00F02E29,00000001,00000364,?,?,?,00EFF2DE,00F03863,00FA1444,?,00EEFDF5,?), ref: 00F04CBE
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AllocateHeap
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1279760036-0
                                                                                                                                                                                                  • Opcode ID: fd81241f6f0747b79293885ce13b2ce8abe2234e5563a21d2bf2e64ee2d0610e
                                                                                                                                                                                                  • Instruction ID: 553b690ecd244ec7071d8acb19f307e2bcb5b36e03a78c094eb67f62ee1bde71
                                                                                                                                                                                                  • Opcode Fuzzy Hash: fd81241f6f0747b79293885ce13b2ce8abe2234e5563a21d2bf2e64ee2d0610e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 62F0BBB2A0222867FB215F629C05B6B37C8BF41770F15C111FA15A61D1CA70F80075E0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RtlAllocateHeap.NTDLL(00000000,?,00FA1444,?,00EEFDF5,?,?,00EDA976,00000010,00FA1440,00ED13FC,?,00ED13C6,?,00ED1129), ref: 00F03852
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AllocateHeap
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1279760036-0
                                                                                                                                                                                                  • Opcode ID: 46b049798b2883fa3d242fb048b5d3d12e927b772876eea333c79a2df9b281b0
                                                                                                                                                                                                  • Instruction ID: 2574cc4712d94eb83b2e6f43e8826c34448352adb68926d7f69481d98ff3f8fe
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 46b049798b2883fa3d242fb048b5d3d12e927b772876eea333c79a2df9b281b0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A0E02B3390022857EB312A779C00BAB37CCAF437B0F0A81A0FD55A64D1CB21DE01B1E0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(?,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4F6D
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FreeLibrary
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3664257935-0
                                                                                                                                                                                                  • Opcode ID: 58fff76834afb2e70af767bcb84b75ecd202a83ee470d162fdc33ef4b4a3f6b0
                                                                                                                                                                                                  • Instruction ID: 6822409b116a8c98435585aaada62bb5c50728f4d1643af269b96315d651e41e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 58fff76834afb2e70af767bcb84b75ecd202a83ee470d162fdc33ef4b4a3f6b0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FEF01CB1205755CFDB349F64D490862BBE4FF24319310A96FE1EAA2661C7319845DB50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • IsWindow.USER32(00000000), ref: 00F62A66
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2353593579-0
                                                                                                                                                                                                  • Opcode ID: 1d393a0a0c4dfd29a45f86d05cedde247f805d6a32fb9338635c00319a69ffbc
                                                                                                                                                                                                  • Instruction ID: 8e6d10a421e7f75ebf343ba08a78ddd33cba40fc52cd8527604bd46f6b14f3a1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1d393a0a0c4dfd29a45f86d05cedde247f805d6a32fb9338635c00319a69ffbc
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 58E02636750516AAC750EB70DC809FE775CEF103A0B000536FC2AC2100DF7CA991B2E0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00ED314E
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: IconNotifyShell_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1144537725-0
                                                                                                                                                                                                  • Opcode ID: 19fe1cebd552af3511bac8ca515b241abf7972340bdbd6114c11a9fe632acd59
                                                                                                                                                                                                  • Instruction ID: bdbbb8933e4c39621a9f3b96ad5cd995d7b9eb834f0083c88daa473b222165f2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 19fe1cebd552af3511bac8ca515b241abf7972340bdbd6114c11a9fe632acd59
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0CF012B09143589FEB52DF24DC457967ABCB701708F0001E9A698A6291DBB45788CB51
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00ED2DC4
                                                                                                                                                                                                    • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: LongNamePath_wcslen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 541455249-0
                                                                                                                                                                                                  • Opcode ID: dd4ecf0022001e6c28ac143df7695545873c20d86617a7af59cf09c5fd28357d
                                                                                                                                                                                                  • Instruction ID: a01ca89c44b58bb9673c3db0d5f4c85dd0cebaa84d69365ec24ab2d06b53bf26
                                                                                                                                                                                                  • Opcode Fuzzy Hash: dd4ecf0022001e6c28ac143df7695545873c20d86617a7af59cf09c5fd28357d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0AE0CD726041245BC710A2589C05FEA77DDDFC8790F050072FD49E7248D964AD818590
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED3837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00ED3908
                                                                                                                                                                                                    • Part of subcall function 00EDD730: GetInputState.USER32 ref: 00EDD807
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00ED2B6B
                                                                                                                                                                                                    • Part of subcall function 00ED30F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00ED314E
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: IconNotifyShell_$CurrentDirectoryInputState
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3667716007-0
                                                                                                                                                                                                  • Opcode ID: ad24097306f56ae216de47a6515a78de71d5a0c306b89662652eea0e66b83e86
                                                                                                                                                                                                  • Instruction ID: 9b90211daf93848637a4e1c615da02674d861a5a820813bdc8a5373ab2a6765b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ad24097306f56ae216de47a6515a78de71d5a0c306b89662652eea0e66b83e86
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B5E0262530420802C608BB34AC1247DB7C9DBD7351F00343FF182A33A3CE6449475252
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateFileW.KERNELBASE(00000000,00000000,?,00F10704,?,?,00000000,?,00F10704,00000000,0000000C), ref: 00F103B7
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateFile
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 823142352-0
                                                                                                                                                                                                  • Opcode ID: f5f597c94d64ed86dec790e0bf43e6e11c5272b878521d46e8eeb4b07dfced82
                                                                                                                                                                                                  • Instruction ID: d7bd6cf491cfb52681c7c0db993bd9af4dd2a4a49e6b80b0f43dbd18c7a1a71f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f5f597c94d64ed86dec790e0bf43e6e11c5272b878521d46e8eeb4b07dfced82
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 39D06C3204010DBBDF028F84DD06EDA3BAAFB48714F014100FE5856020C772E821AB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00ED1CBC
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: InfoParametersSystem
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3098949447-0
                                                                                                                                                                                                  • Opcode ID: 5e89ab1e56213334519c2da430345352695fed7da87820fdc42335a722571e83
                                                                                                                                                                                                  • Instruction ID: d5ab5a1d2b36b91077655f1583546087d558803c5ba1d9dc9b9ecd915d2a3551
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5e89ab1e56213334519c2da430345352695fed7da87820fdc42335a722571e83
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5CC09B7538030C9FF6144B84BC4AF107754B349B10F084001F659555E3C7E11810FA90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                  • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00F6961A
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F6965B
                                                                                                                                                                                                  • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00F6969F
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F696C9
                                                                                                                                                                                                  • SendMessageW.USER32 ref: 00F696F2
                                                                                                                                                                                                  • GetKeyState.USER32(00000011), ref: 00F6978B
                                                                                                                                                                                                  • GetKeyState.USER32(00000009), ref: 00F69798
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00F697AE
                                                                                                                                                                                                  • GetKeyState.USER32(00000010), ref: 00F697B8
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F697E9
                                                                                                                                                                                                  • SendMessageW.USER32 ref: 00F69810
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001030,?,00F67E95), ref: 00F69918
                                                                                                                                                                                                  • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00F6992E
                                                                                                                                                                                                  • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00F69941
                                                                                                                                                                                                  • SetCapture.USER32(?), ref: 00F6994A
                                                                                                                                                                                                  • ClientToScreen.USER32(?,?), ref: 00F699AF
                                                                                                                                                                                                  • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00F699BC
                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F699D6
                                                                                                                                                                                                  • ReleaseCapture.USER32 ref: 00F699E1
                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00F69A19
                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00F69A26
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F69A80
                                                                                                                                                                                                  • SendMessageW.USER32 ref: 00F69AAE
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F69AEB
                                                                                                                                                                                                  • SendMessageW.USER32 ref: 00F69B1A
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00F69B3B
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00F69B4A
                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00F69B68
                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00F69B75
                                                                                                                                                                                                  • GetParent.USER32(?), ref: 00F69B93
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001012,00000000,?), ref: 00F69BFA
                                                                                                                                                                                                  • SendMessageW.USER32 ref: 00F69C2B
                                                                                                                                                                                                  • ClientToScreen.USER32(?,?), ref: 00F69C84
                                                                                                                                                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00F69CB4
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,?), ref: 00F69CDE
                                                                                                                                                                                                  • SendMessageW.USER32 ref: 00F69D01
                                                                                                                                                                                                  • ClientToScreen.USER32(?,?), ref: 00F69D4E
                                                                                                                                                                                                  • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00F69D82
                                                                                                                                                                                                    • Part of subcall function 00EE9944: GetWindowLongW.USER32(?,000000EB), ref: 00EE9952
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00F69E05
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                                                                                                                                                  • String ID: @GUI_DRAGID$F
                                                                                                                                                                                                  • API String ID: 3429851547-4164748364
                                                                                                                                                                                                  • Opcode ID: bb3d63dc8e3bf732e4ff39423826ffb2421cd04b60a32e9ffb292a482663837f
                                                                                                                                                                                                  • Instruction ID: c253acd35ecbce4af3101d34ff25806f4611a6c76f7a82770662fbdb80e87361
                                                                                                                                                                                                  • Opcode Fuzzy Hash: bb3d63dc8e3bf732e4ff39423826ffb2421cd04b60a32e9ffb292a482663837f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9642A075608305AFD724CF28CC44AAABBE9FF49320F14061DF5A9972A1D7B2D850EF91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00F648F3
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00F64908
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00F64927
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00F6494B
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00F6495C
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00F6497B
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00F649AE
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00F649D4
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00F64A0F
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00F64A56
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00F64A7E
                                                                                                                                                                                                  • IsMenu.USER32(?), ref: 00F64A97
                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F64AF2
                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F64B20
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00F64B94
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00F64BE3
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00F64C82
                                                                                                                                                                                                  • wsprintfW.USER32 ref: 00F64CAE
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F64CC9
                                                                                                                                                                                                  • GetWindowTextW.USER32(?,00000000,00000001), ref: 00F64CF1
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00F64D13
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F64D33
                                                                                                                                                                                                  • GetWindowTextW.USER32(?,00000000,00000001), ref: 00F64D5A
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                                                                                                                                                  • String ID: %d/%02d/%02d
                                                                                                                                                                                                  • API String ID: 4054740463-328681919
                                                                                                                                                                                                  • Opcode ID: d2225e7a35c4710f668f0e7e0458bc80ed00f6b1b2b5e0cbbd149e021fa8b4a4
                                                                                                                                                                                                  • Instruction ID: 04afc74a1814f7377557862794592c77dd5e0a9595ff2aa08fcd931daee1a37c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d2225e7a35c4710f668f0e7e0458bc80ed00f6b1b2b5e0cbbd149e021fa8b4a4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 97122471900248ABEB24AF24DC49FBE7BF8EF45720F104119F565EB2E1DBB4A941EB50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00EEF998
                                                                                                                                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F2F474
                                                                                                                                                                                                  • IsIconic.USER32(00000000), ref: 00F2F47D
                                                                                                                                                                                                  • ShowWindow.USER32(00000000,00000009), ref: 00F2F48A
                                                                                                                                                                                                  • SetForegroundWindow.USER32(00000000), ref: 00F2F494
                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F2F4AA
                                                                                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00F2F4B1
                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00F2F4BD
                                                                                                                                                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F2F4CE
                                                                                                                                                                                                  • AttachThreadInput.USER32(?,00000000,00000001), ref: 00F2F4D6
                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00F2F4DE
                                                                                                                                                                                                  • SetForegroundWindow.USER32(00000000), ref: 00F2F4E1
                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F2F4F6
                                                                                                                                                                                                  • keybd_event.USER32(00000012,00000000), ref: 00F2F501
                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F2F50B
                                                                                                                                                                                                  • keybd_event.USER32(00000012,00000000), ref: 00F2F510
                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F2F519
                                                                                                                                                                                                  • keybd_event.USER32(00000012,00000000), ref: 00F2F51E
                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00F2F528
                                                                                                                                                                                                  • keybd_event.USER32(00000012,00000000), ref: 00F2F52D
                                                                                                                                                                                                  • SetForegroundWindow.USER32(00000000), ref: 00F2F530
                                                                                                                                                                                                  • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00F2F557
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                                                                                                                  • String ID: Shell_TrayWnd
                                                                                                                                                                                                  • API String ID: 4125248594-2988720461
                                                                                                                                                                                                  • Opcode ID: ac1bc0a9892532a56ea8e30ccdbf005044f3abe9192b1897d5a2b9326a49a335
                                                                                                                                                                                                  • Instruction ID: c8ec75ae63c213d35749b1cd200452f24548a8acaeb4abcefb8e1ef6537e5982
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ac1bc0a9892532a56ea8e30ccdbf005044f3abe9192b1897d5a2b9326a49a335
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5A316171A5022CBBEB206BB59C4AFBF7E7CEB44B50F140026FA55E61D1C6F15D00BAA1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F316C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F3170D
                                                                                                                                                                                                    • Part of subcall function 00F316C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F3173A
                                                                                                                                                                                                    • Part of subcall function 00F316C3: GetLastError.KERNEL32 ref: 00F3174A
                                                                                                                                                                                                  • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00F31286
                                                                                                                                                                                                  • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00F312A8
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00F312B9
                                                                                                                                                                                                  • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00F312D1
                                                                                                                                                                                                  • GetProcessWindowStation.USER32 ref: 00F312EA
                                                                                                                                                                                                  • SetProcessWindowStation.USER32(00000000), ref: 00F312F4
                                                                                                                                                                                                  • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00F31310
                                                                                                                                                                                                    • Part of subcall function 00F310BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F311FC), ref: 00F310D4
                                                                                                                                                                                                    • Part of subcall function 00F310BF: CloseHandle.KERNEL32(?,?,00F311FC), ref: 00F310E9
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                                                                                                                  • String ID: $default$winsta0
                                                                                                                                                                                                  • API String ID: 22674027-1027155976
                                                                                                                                                                                                  • Opcode ID: 4b8ce07487f43bc52d9c2abd074050e5b3976f3c53877801d159e6dd9b959d9f
                                                                                                                                                                                                  • Instruction ID: 2dde216cf817d350fa886bd48f5d487bcb3cf455ace3f7f8b8b72249fbc4af1f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4b8ce07487f43bc52d9c2abd074050e5b3976f3c53877801d159e6dd9b959d9f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 95818971900209ABDF21DFA4DC49BFE7BB9FF05720F144129FA61A62A0CB758954EB60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F310F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F31114
                                                                                                                                                                                                    • Part of subcall function 00F310F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F31120
                                                                                                                                                                                                    • Part of subcall function 00F310F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F3112F
                                                                                                                                                                                                    • Part of subcall function 00F310F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F31136
                                                                                                                                                                                                    • Part of subcall function 00F310F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F3114D
                                                                                                                                                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00F30BCC
                                                                                                                                                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00F30C00
                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00F30C17
                                                                                                                                                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00F30C51
                                                                                                                                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00F30C6D
                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00F30C84
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00F30C8C
                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00F30C93
                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00F30CB4
                                                                                                                                                                                                  • CopySid.ADVAPI32(00000000), ref: 00F30CBB
                                                                                                                                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00F30CEA
                                                                                                                                                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00F30D0C
                                                                                                                                                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00F30D1E
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F30D45
                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00F30D4C
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F30D55
                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00F30D5C
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F30D65
                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00F30D6C
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00F30D78
                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00F30D7F
                                                                                                                                                                                                    • Part of subcall function 00F31193: GetProcessHeap.KERNEL32(00000008,00F30BB1,?,00000000,?,00F30BB1,?), ref: 00F311A1
                                                                                                                                                                                                    • Part of subcall function 00F31193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00F30BB1,?), ref: 00F311A8
                                                                                                                                                                                                    • Part of subcall function 00F31193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00F30BB1,?), ref: 00F311B7
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4175595110-0
                                                                                                                                                                                                  • Opcode ID: 6d9ebe83db77d4bceb9ea8380ecd2fad7a5207ff0bef3b20d0b4ab788449a38b
                                                                                                                                                                                                  • Instruction ID: de9bf75b9ba808494629246c459ec5b7d5212c06b0b8650efea98895c6fc66ce
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6d9ebe83db77d4bceb9ea8380ecd2fad7a5207ff0bef3b20d0b4ab788449a38b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5F715B72D0020ABBDF10DFA5DC44FAEBBB8BF05320F044556E954E7191DBB5A905EBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • OpenClipboard.USER32(00F6CC08), ref: 00F4EB29
                                                                                                                                                                                                  • IsClipboardFormatAvailable.USER32(0000000D), ref: 00F4EB37
                                                                                                                                                                                                  • GetClipboardData.USER32(0000000D), ref: 00F4EB43
                                                                                                                                                                                                  • CloseClipboard.USER32 ref: 00F4EB4F
                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00F4EB87
                                                                                                                                                                                                  • CloseClipboard.USER32 ref: 00F4EB91
                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00F4EBBC
                                                                                                                                                                                                  • IsClipboardFormatAvailable.USER32(00000001), ref: 00F4EBC9
                                                                                                                                                                                                  • GetClipboardData.USER32(00000001), ref: 00F4EBD1
                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00F4EBE2
                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00F4EC22
                                                                                                                                                                                                  • IsClipboardFormatAvailable.USER32(0000000F), ref: 00F4EC38
                                                                                                                                                                                                  • GetClipboardData.USER32(0000000F), ref: 00F4EC44
                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00F4EC55
                                                                                                                                                                                                  • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00F4EC77
                                                                                                                                                                                                  • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00F4EC94
                                                                                                                                                                                                  • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00F4ECD2
                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00F4ECF3
                                                                                                                                                                                                  • CountClipboardFormats.USER32 ref: 00F4ED14
                                                                                                                                                                                                  • CloseClipboard.USER32 ref: 00F4ED59
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 420908878-0
                                                                                                                                                                                                  • Opcode ID: 5a0e42a4947b6800ef7b41588d9b099b1f5aac03525cc5f9c23c968928ae7a8e
                                                                                                                                                                                                  • Instruction ID: af09f56170649d40dc049f1819f6e89c2de891cd241c719e75564b0ecb00d313
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5a0e42a4947b6800ef7b41588d9b099b1f5aac03525cc5f9c23c968928ae7a8e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0361AD356042059FD300EF24D894F3ABBE4FF84714F14551EF8A6972A2CB71E946EBA2
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00F469BE
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00F46A12
                                                                                                                                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F46A4E
                                                                                                                                                                                                  • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00F46A75
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00F46AB2
                                                                                                                                                                                                  • FileTimeToSystemTime.KERNEL32(?,?), ref: 00F46ADF
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                                                                                                                  • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                                                                                                                  • API String ID: 3830820486-3289030164
                                                                                                                                                                                                  • Opcode ID: a82fed52af8dd731f04854ed0262088804980460c180fefcc72554de2e1ed5e8
                                                                                                                                                                                                  • Instruction ID: 5c329f56e6092732ab65858d91d43d93ce37f606a151afd2df84d036a7d7b74a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a82fed52af8dd731f04854ed0262088804980460c180fefcc72554de2e1ed5e8
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 98D16072508340AEC714EBA0CC91EABB7ECEF88704F44591EF985D7291EB74DA05CB62
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00F49663
                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 00F496A1
                                                                                                                                                                                                  • SetFileAttributesW.KERNEL32(?,?), ref: 00F496BB
                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00F496D3
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00F496DE
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00F496FA
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F4974A
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(00F96B7C), ref: 00F49768
                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F49772
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00F4977F
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00F4978F
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                  • API String ID: 1409584000-438819550
                                                                                                                                                                                                  • Opcode ID: 14ed6efcf0932d1e37208c0b5aa3c8e10c28bca5aa4eb3d74b7b6b9ab093ac32
                                                                                                                                                                                                  • Instruction ID: b3c5447aec213aa1bb10fe0235662635a2980bd2bac747c8849c9fc8c49eb796
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 14ed6efcf0932d1e37208c0b5aa3c8e10c28bca5aa4eb3d74b7b6b9ab093ac32
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6F31B032B0421D6ADF10EFB4DC09AEF7BAC9F49320F104156EDA5E21A0EBB0DD40AB54
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00F497BE
                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00F49819
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00F49824
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(*.*,?), ref: 00F49840
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F49890
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(00F96B7C), ref: 00F498AE
                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F498B8
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00F498C5
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00F498D5
                                                                                                                                                                                                    • Part of subcall function 00F3DAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00F3DB00
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                  • API String ID: 2640511053-438819550
                                                                                                                                                                                                  • Opcode ID: 0f65349d6c1880ac6a901d4684ee69491a8ed12751bb942a361eec3e2a469379
                                                                                                                                                                                                  • Instruction ID: e06d942e0271081db6d47ed63865d5ae96b87d6999549dff21dc0c0b1136d34b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0f65349d6c1880ac6a901d4684ee69491a8ed12751bb942a361eec3e2a469379
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C231B332A0421D6AEF10EFA8DC49AEF7BAC9F46330F504155ED90E21A1DBB0D944EB60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F5B6AE,?,?), ref: 00F5C9B5
                                                                                                                                                                                                    • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5C9F1
                                                                                                                                                                                                    • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA68
                                                                                                                                                                                                    • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA9E
                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F5BF3E
                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00F5BFA9
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00F5BFCD
                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00F5C02C
                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00F5C0E7
                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00F5C154
                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00F5C1E9
                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00F5C23A
                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00F5C2E3
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00F5C382
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00F5C38F
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3102970594-0
                                                                                                                                                                                                  • Opcode ID: 0213e9b5fdef89d59a7e45c9e35e60a25f84920a636a5bfc69c0487137760916
                                                                                                                                                                                                  • Instruction ID: 0874d96cc81f356935c606345a506dd66fa40e3a15c309cbcd53721530363380
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0213e9b5fdef89d59a7e45c9e35e60a25f84920a636a5bfc69c0487137760916
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 89025F71604300AFC714DF24C895E2ABBE5EF89314F18849DF98ADB2A2D731ED46DB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetLocalTime.KERNEL32(?), ref: 00F48257
                                                                                                                                                                                                  • SystemTimeToFileTime.KERNEL32(?,?), ref: 00F48267
                                                                                                                                                                                                  • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00F48273
                                                                                                                                                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F48310
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F48324
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F48356
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00F4838C
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F48395
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                  • API String ID: 1464919966-438819550
                                                                                                                                                                                                  • Opcode ID: 1214da62fc491ea9794f5f45ef6aa2af0e2ae96cf8399ac54b374c788bc868fa
                                                                                                                                                                                                  • Instruction ID: 03b9f8b15804368cb9ac430c743fe3e3176ceb9ca35d681bb87b942aa9326f4f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1214da62fc491ea9794f5f45ef6aa2af0e2ae96cf8399ac54b374c788bc868fa
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4A619B725043059FCB10EF60C8409AEB7E8FF89360F04891EF999D7251EB35E906DB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00ED3A97,?,?,00ED2E7F,?,?,?,00000000), ref: 00ED3AC2
                                                                                                                                                                                                    • Part of subcall function 00F3E199: GetFileAttributesW.KERNEL32(?,00F3CF95), ref: 00F3E19A
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00F3D122
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00F3D1DD
                                                                                                                                                                                                  • MoveFileW.KERNEL32(?,?), ref: 00F3D1F0
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 00F3D20D
                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F3D237
                                                                                                                                                                                                    • Part of subcall function 00F3D29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00F3D21C,?,?), ref: 00F3D2B2
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000,?,?,?), ref: 00F3D253
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00F3D264
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                                                                                                                  • String ID: \*.*
                                                                                                                                                                                                  • API String ID: 1946585618-1173974218
                                                                                                                                                                                                  • Opcode ID: c2105591492f6289839742f55add3c7f28776b940d69c8029ec9e8d7337877da
                                                                                                                                                                                                  • Instruction ID: d0ff024fc6a58a8a4addd58000af69edab18c5a974b0f1e98a231c24580f57de
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c2105591492f6289839742f55add3c7f28776b940d69c8029ec9e8d7337877da
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A1618D31D0110D9BCF05EBA0EE929EEB7B5EF55310F244066E44177292EB349F0AEB61
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1737998785-0
                                                                                                                                                                                                  • Opcode ID: 42514a2f18123dc22c9a9ba7f6701b32e40093c562fa6ed0d69ad4f02f2481b3
                                                                                                                                                                                                  • Instruction ID: f141ff6d1ddd79fb0f830472c0b6319c94b628fc8c258f4a7335ac3098549c7e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 42514a2f18123dc22c9a9ba7f6701b32e40093c562fa6ed0d69ad4f02f2481b3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D841AE35A04611AFD710DF15D888B69BBE1FF44328F15C099E8A98B762C776EC42DBD0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F316C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F3170D
                                                                                                                                                                                                    • Part of subcall function 00F316C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F3173A
                                                                                                                                                                                                    • Part of subcall function 00F316C3: GetLastError.KERNEL32 ref: 00F3174A
                                                                                                                                                                                                  • ExitWindowsEx.USER32(?,00000000), ref: 00F3E932
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                                                                                                  • String ID: $ $@$SeShutdownPrivilege
                                                                                                                                                                                                  • API String ID: 2234035333-3163812486
                                                                                                                                                                                                  • Opcode ID: 04f743defd9968c00dc5131269eb0bc7a6249437767a983ecf739888a16995a5
                                                                                                                                                                                                  • Instruction ID: 9550a2b6740f11c68128d61bfde7ab581471422a6934b289aa22029aceca39ed
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 04f743defd9968c00dc5131269eb0bc7a6249437767a983ecf739888a16995a5
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C301D673A12215ABEB6426B49C86BBB725CAF14770F154422FD53E21D1D5A49C40B3D0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00F51276
                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00F51283
                                                                                                                                                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 00F512BA
                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00F512C5
                                                                                                                                                                                                  • closesocket.WSOCK32(00000000), ref: 00F512F4
                                                                                                                                                                                                  • listen.WSOCK32(00000000,00000005), ref: 00F51303
                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00F5130D
                                                                                                                                                                                                  • closesocket.WSOCK32(00000000), ref: 00F5133C
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 540024437-0
                                                                                                                                                                                                  • Opcode ID: 9739ca5a84622ac5085a9b3737e60d4e571227d6b65b26b833806d0e4f004f64
                                                                                                                                                                                                  • Instruction ID: e4a7b10a9bfff5c8b62a8dda5b54819393d64c70b3aba1c00b98dedbbe635004
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9739ca5a84622ac5085a9b3737e60d4e571227d6b65b26b833806d0e4f004f64
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A0419131A001019FD720DF24C484B29BBE5BF86329F188189D9969F292C775FC86DBE1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00ED3A97,?,?,00ED2E7F,?,?,?,00000000), ref: 00ED3AC2
                                                                                                                                                                                                    • Part of subcall function 00F3E199: GetFileAttributesW.KERNEL32(?,00F3CF95), ref: 00F3E19A
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00F3D420
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,?), ref: 00F3D470
                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,00000010), ref: 00F3D481
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00F3D498
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00F3D4A1
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                                                                                                                  • String ID: \*.*
                                                                                                                                                                                                  • API String ID: 2649000838-1173974218
                                                                                                                                                                                                  • Opcode ID: cdca38e38b1af4502a09b9ac274f23bfb2aec880e622ee3264ad58159e51a6b4
                                                                                                                                                                                                  • Instruction ID: f3e9a71337e8d80eb6b07885a9558b0800cb6a7bb9ac89fa3b8a702bc7f60738
                                                                                                                                                                                                  • Opcode Fuzzy Hash: cdca38e38b1af4502a09b9ac274f23bfb2aec880e622ee3264ad58159e51a6b4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 303164714083459BC305EF64D8518AF77E8EE91324F44592EF4E193291EB30AA0AE763
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: __floor_pentium4
                                                                                                                                                                                                  • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                                                                                                  • API String ID: 4168288129-2761157908
                                                                                                                                                                                                  • Opcode ID: 5f78d8e42be23ee93d24b2479a346ebd1506d589cae5735562f47b207b85a34f
                                                                                                                                                                                                  • Instruction ID: a1a4bcbbeeb9d41add6420ca4ceb6cac7c8e4dffbe8c624721dcbe61fab681ed
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5f78d8e42be23ee93d24b2479a346ebd1506d589cae5735562f47b207b85a34f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 12C24D72E046298FDB35CE28DD407EAB7B5EB48314F1445EAD84DE7280E774AE85AF40
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F464DC
                                                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 00F46639
                                                                                                                                                                                                  • CoCreateInstance.OLE32(00F6FCF8,00000000,00000001,00F6FB68,?), ref: 00F46650
                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 00F468D4
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                                                                                  • String ID: .lnk
                                                                                                                                                                                                  • API String ID: 886957087-24824748
                                                                                                                                                                                                  • Opcode ID: 92946714e012cb64efd40ba946cb9a9110eecc46935ce38c22abbc8b61b323ab
                                                                                                                                                                                                  • Instruction ID: 19c302408c4200ff657ad144f8180945fe9cace6b5e056a83dc13648460f389a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 92946714e012cb64efd40ba946cb9a9110eecc46935ce38c22abbc8b61b323ab
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 08D149716082019FC304EF24C88196BBBE8FF99704F14496EF595DB292EB70ED06CB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetForegroundWindow.USER32(?,?,00000000), ref: 00F522E8
                                                                                                                                                                                                    • Part of subcall function 00F4E4EC: GetWindowRect.USER32(?,?), ref: 00F4E504
                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00F52312
                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 00F52319
                                                                                                                                                                                                  • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00F52355
                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00F52381
                                                                                                                                                                                                  • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00F523DF
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2387181109-0
                                                                                                                                                                                                  • Opcode ID: c654f7c5a9a4b8a057af13095fc13d6f3e1182417227112cd0299346380bf4d4
                                                                                                                                                                                                  • Instruction ID: 8ee3b07138b6ebf8356b57da7597b1b2fcba894ddb10886e16fc1cc49a42ecd1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c654f7c5a9a4b8a057af13095fc13d6f3e1182417227112cd0299346380bf4d4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E631ED72504309ABD720DF54CC48B6BBBA9FF85320F000A19FA9597191DB74EA08DBD2
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00F49B78
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00F49C8B
                                                                                                                                                                                                    • Part of subcall function 00F43874: GetInputState.USER32 ref: 00F438CB
                                                                                                                                                                                                    • Part of subcall function 00F43874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F43966
                                                                                                                                                                                                  • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00F49BA8
                                                                                                                                                                                                  • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00F49C75
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                  • API String ID: 1972594611-438819550
                                                                                                                                                                                                  • Opcode ID: d064faf1bf23dc930d69e175c9438026a5c0114d567129e574fb0d4f6641ff95
                                                                                                                                                                                                  • Instruction ID: f8524bcb7d3a7ba8dad3083c3045f59747f66b720656dfbcc2c906f9316cf17b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d064faf1bf23dc930d69e175c9438026a5c0114d567129e574fb0d4f6641ff95
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BA41B271E0420A9FCF14DF64CC85AEEBBF4EF45310F204056E955A2291EB709E45EFA1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                  • DefDlgProcW.USER32(?,?,?,?,?), ref: 00EE9A4E
                                                                                                                                                                                                  • GetSysColor.USER32(0000000F), ref: 00EE9B23
                                                                                                                                                                                                  • SetBkColor.GDI32(?,00000000), ref: 00EE9B36
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Color$LongProcWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3131106179-0
                                                                                                                                                                                                  • Opcode ID: 492dbda806f2ff5b5bf998632253c2e23532196a2bf3289a3b5f700e25ed7ac3
                                                                                                                                                                                                  • Instruction ID: 832de1faef8c07c83eb29c9a7240ffe34aec12a0d38b5d0c349d953e473b6a08
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 492dbda806f2ff5b5bf998632253c2e23532196a2bf3289a3b5f700e25ed7ac3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A4A15B705086ACBEE724AA3E9C58EBB3ADDEF42314F151119F402E7693CB259D01F276
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F5304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F5307A
                                                                                                                                                                                                    • Part of subcall function 00F5304E: _wcslen.LIBCMT ref: 00F5309B
                                                                                                                                                                                                  • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00F5185D
                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00F51884
                                                                                                                                                                                                  • bind.WSOCK32(00000000,?,00000010), ref: 00F518DB
                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00F518E6
                                                                                                                                                                                                  • closesocket.WSOCK32(00000000), ref: 00F51915
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1601658205-0
                                                                                                                                                                                                  • Opcode ID: a57d1a56c9ef7964cfc53db8e9759ebe3db670c41669214e91d35e93d45743f1
                                                                                                                                                                                                  • Instruction ID: 4767b62b1f332b1884c807a686dbac0f9854c4f717cd624e543202d0c54d3aab
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a57d1a56c9ef7964cfc53db8e9759ebe3db670c41669214e91d35e93d45743f1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BD510471A00200AFDB20AF24C886F6A77E5EB44719F189058FA55AF3C3C770AD42CBE1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 292994002-0
                                                                                                                                                                                                  • Opcode ID: 14e7d0fbfcad788e0f00df837e960a10787d695a4f292935b0c2eea6f17e8482
                                                                                                                                                                                                  • Instruction ID: 5349970a1e1452bd2c5398816cd644b4e289e334ab585d961b1e4f2ae5e3717d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 14e7d0fbfcad788e0f00df837e960a10787d695a4f292935b0c2eea6f17e8482
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A021A331B406115FD7209F1AC884BAA7BE5FF95325B1D8059E88ACB351CBB5DC42EB90
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                                                                                                                                  • API String ID: 0-1546025612
                                                                                                                                                                                                  • Opcode ID: 751a3279f077c06c2c919966a0e61431c516d8126ea493bd4cdb090ac71b9455
                                                                                                                                                                                                  • Instruction ID: 9feb3a93b2a202ac5642a619a8b99c7052150bea335eec77392db6f12ea65044
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 751a3279f077c06c2c919966a0e61431c516d8126ea493bd4cdb090ac71b9455
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CCA24A71E0021ACBDF24CF58C9407EEB7B1EB94724F2491AAE815A7385DB749DC2DB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00F3AAAC
                                                                                                                                                                                                  • SetKeyboardState.USER32(00000080), ref: 00F3AAC8
                                                                                                                                                                                                  • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00F3AB36
                                                                                                                                                                                                  • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00F3AB88
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 432972143-0
                                                                                                                                                                                                  • Opcode ID: f711ab4c8836d51f54d1964a4a3f6edf50d4ff8cbfd31801c4f6a3f9631de527
                                                                                                                                                                                                  • Instruction ID: cc2f040891acc6d38474be7e905ecbf7e8661832b6f279845098ad594f7dad6e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f711ab4c8836d51f54d1964a4a3f6edf50d4ff8cbfd31801c4f6a3f9631de527
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 41311831E40648AEFF35CB66CC05BFABBA6AB84330F04421AF1D5561D1D3B58981E7A2
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0BB7F
                                                                                                                                                                                                    • Part of subcall function 00F029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000), ref: 00F029DE
                                                                                                                                                                                                    • Part of subcall function 00F029C8: GetLastError.KERNEL32(00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000,00000000), ref: 00F029F0
                                                                                                                                                                                                  • GetTimeZoneInformation.KERNEL32 ref: 00F0BB91
                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,00FA121C,000000FF,?,0000003F,?,?), ref: 00F0BC09
                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,?,00FA1270,000000FF,?,0000003F,?,?,?,00FA121C,000000FF,?,0000003F,?,?), ref: 00F0BC36
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 806657224-0
                                                                                                                                                                                                  • Opcode ID: ba8b10d88945af9f9e09a35df645990da9abc874ded62ff22990603fbee016d1
                                                                                                                                                                                                  • Instruction ID: 6c138b99ade40f8ce70ea29a141d14fe247de13bf07ee079d07d2e735f5a77ee
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ba8b10d88945af9f9e09a35df645990da9abc874ded62ff22990603fbee016d1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FD31AFB1904249DFDB11DF69CC81A69BBF8FF46360B1586AAE060D72E1D7309D40FB50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • InternetReadFile.WININET(?,?,00000400,?), ref: 00F4CE89
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000000), ref: 00F4CEEA
                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000000), ref: 00F4CEFE
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorEventFileInternetLastRead
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 234945975-0
                                                                                                                                                                                                  • Opcode ID: a5dfaf3f3707376f63b48f2bb7caaeeced154a0f5e8a16278f8d8fde21c8a62c
                                                                                                                                                                                                  • Instruction ID: 295ce7a3f3b2def96589569669cc4a90e47ee0345c66649407f8f312b32f1092
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a5dfaf3f3707376f63b48f2bb7caaeeced154a0f5e8a16278f8d8fde21c8a62c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B521A1719013099BD760DF65C944BA77BFCEB40364F10541EEA86E2151E774EE04ABA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00F382AA
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: lstrlen
                                                                                                                                                                                                  • String ID: ($|
                                                                                                                                                                                                  • API String ID: 1659193697-1631851259
                                                                                                                                                                                                  • Opcode ID: a8da95fb8fb998677491da37fd2a3a84d6b9e8a894391c54f9d950ef82658203
                                                                                                                                                                                                  • Instruction ID: 6881395d064329c80f686215c9a4d562f7157a7e32b1c106b25e7a1d46c58819
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a8da95fb8fb998677491da37fd2a3a84d6b9e8a894391c54f9d950ef82658203
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 31323575A007059FCB28CF59C481A6AB7F0FF48760F15856EE49ADB3A1EB74E942CB40
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00F45CC1
                                                                                                                                                                                                  • FindNextFileW.KERNEL32(00000000,?), ref: 00F45D17
                                                                                                                                                                                                  • FindClose.KERNEL32(?), ref: 00F45D5F
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Find$File$CloseFirstNext
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3541575487-0
                                                                                                                                                                                                  • Opcode ID: 7ed8015c30c7456ae0194b3d33a78b01ce267b382f4db7ccbea44945c23a06f5
                                                                                                                                                                                                  • Instruction ID: 19985fd236398ffc8da7e598c76f040dfd55902cc393a56373c6b4753e4858b3
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7ed8015c30c7456ae0194b3d33a78b01ce267b382f4db7ccbea44945c23a06f5
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 93519C35A046019FC714DF28C494A9ABBF4FF49324F14855EE99A8B3A2DB30ED05DB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • IsDebuggerPresent.KERNEL32 ref: 00F0271A
                                                                                                                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00F02724
                                                                                                                                                                                                  • UnhandledExceptionFilter.KERNEL32(?), ref: 00F02731
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3906539128-0
                                                                                                                                                                                                  • Opcode ID: 49cbd9a1ae2b67a9b8e6706f9ae412dc2116c4d956277884a6518e7996044cbd
                                                                                                                                                                                                  • Instruction ID: 583abfb90bea3c4164305215223a5b476a95bad2a5479337fc49212f562bbf44
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 49cbd9a1ae2b67a9b8e6706f9ae412dc2116c4d956277884a6518e7996044cbd
                                                                                                                                                                                                  • Instruction Fuzzy Hash: EF31C47491121C9BCB21DF64DC89798B7B8BF08310F5041EAE91CA6261E7709F819F54
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00F451DA
                                                                                                                                                                                                  • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00F45238
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000), ref: 00F452A1
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorMode$DiskFreeSpace
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1682464887-0
                                                                                                                                                                                                  • Opcode ID: b9b414a955d0ea4418976dab4ed6fad262f817eab611a8071e619c0b3113f076
                                                                                                                                                                                                  • Instruction ID: 7fac5f80787a4324f6130929d79918894f5f607a9b094c027fc1448281973a47
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b9b414a955d0ea4418976dab4ed6fad262f817eab611a8071e619c0b3113f076
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1B318035A00508DFDB00DF54D884EADBBF4FF09318F08809AE845AB352DB71E946CB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00EEFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00EF0668
                                                                                                                                                                                                    • Part of subcall function 00EEFDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00EF0685
                                                                                                                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00F3170D
                                                                                                                                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00F3173A
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00F3174A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 577356006-0
                                                                                                                                                                                                  • Opcode ID: ea7d0537121ba480aae333f1991134e867a02c6142b9066afcc3141931fb0d7d
                                                                                                                                                                                                  • Instruction ID: 743b8556b32be6467be9e1e6ee25a23542557b299ec9a935bbe590ed90b5244b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ea7d0537121ba480aae333f1991134e867a02c6142b9066afcc3141931fb0d7d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2A11C1B2404309BFD718AF54DC86E6ABBFDFB04764B24852EE09693241EB70BC418A60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00F3D608
                                                                                                                                                                                                  • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00F3D645
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00F3D650
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseControlCreateDeviceFileHandle
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 33631002-0
                                                                                                                                                                                                  • Opcode ID: 0e29ab10ff8567d919b78903a6a782e911053938b663a8a038d2bb152009cb07
                                                                                                                                                                                                  • Instruction ID: 44a2b21a087354d8c9fc9dfe2d869f8761fe2714e2806d8f0a597fbe929cd999
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0e29ab10ff8567d919b78903a6a782e911053938b663a8a038d2bb152009cb07
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 86118E71E01228BFDB108F95EC45FAFBBBCEB45B60F108111F914E7290C2B04A059BE1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00F3168C
                                                                                                                                                                                                  • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00F316A1
                                                                                                                                                                                                  • FreeSid.ADVAPI32(?), ref: 00F316B1
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3429775523-0
                                                                                                                                                                                                  • Opcode ID: 867e6334e15a9a17d39ec3dcee7d02e664083b59ace483b4ac305294c056204d
                                                                                                                                                                                                  • Instruction ID: dc89ae1cb823f35379f810e18a519fd43ff80b0d6ce2f906dbd6a7952f31a5ac
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 867e6334e15a9a17d39ec3dcee7d02e664083b59ace483b4ac305294c056204d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5FF0447195030CFBDB00DFE08D89AAEBBBCFB08200F404461E940E2180E370AA04AA90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetUserNameW.ADVAPI32(?,?), ref: 00F2D28C
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: NameUser
                                                                                                                                                                                                  • String ID: X64
                                                                                                                                                                                                  • API String ID: 2645101109-893830106
                                                                                                                                                                                                  • Opcode ID: 0fc0eeeef4d18178d175a99f11f50f32053e2a5034e27a4a75f35794399c124f
                                                                                                                                                                                                  • Instruction ID: 3edea6fba5155dc6f9aac4193e4cfd5a7d58b8e14ec8ba3d00f04c2e535a6e11
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0fc0eeeef4d18178d175a99f11f50f32053e2a5034e27a4a75f35794399c124f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B8D0CAB580512DFACB94CBA0EC88EEAB3BCBB04305F100292F146E2040DB709648AF60
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                  • Instruction ID: bff5b43e16a6fcda3398f4ecf8cb61d1c899a3b007756304f141524d65a5e351
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1E02F872E0021D9BDF14CFA9C9806ADFBF1EF88314F35916AD919B7284D731AA41CB94
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • FindFirstFileW.KERNEL32(?,?), ref: 00F46918
                                                                                                                                                                                                  • FindClose.KERNEL32(00000000), ref: 00F46961
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Find$CloseFileFirst
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2295610775-0
                                                                                                                                                                                                  • Opcode ID: 6ab3aedd0f396336942ce161a944768cdca7c8cea2432e6a7e0078848f92c4c7
                                                                                                                                                                                                  • Instruction ID: 97c88a1551a22ab6445c03517d4c9bcde31788e5792959ca6b80cc7618cd5939
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6ab3aedd0f396336942ce161a944768cdca7c8cea2432e6a7e0078848f92c4c7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 611190316042019FD710DF29D484A26BBE5FF85328F15C69AE8A99F3A2C770EC45CB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00F54891,?,?,00000035,?), ref: 00F437E4
                                                                                                                                                                                                  • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00F54891,?,?,00000035,?), ref: 00F437F4
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorFormatLastMessage
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3479602957-0
                                                                                                                                                                                                  • Opcode ID: 85961e7f1e1fcda8cfb1f87a60786eb211e6651b2bd3d76c2d63dcc0987a50a6
                                                                                                                                                                                                  • Instruction ID: a6d0c08c9906e53dba7da1c46bffa40dbeac5530afeff71e725c18e8bae35718
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 85961e7f1e1fcda8cfb1f87a60786eb211e6651b2bd3d76c2d63dcc0987a50a6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 00F0E5B16052282AE72017668C4EFEB7AAEEFC4761F000165F949E2281D9A09944D6F0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00F3B25D
                                                                                                                                                                                                  • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00F3B270
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: InputSendkeybd_event
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3536248340-0
                                                                                                                                                                                                  • Opcode ID: 55b4d9a85e04e168b5b4060a8a727da619c1e8e7f7e96e583f47cfbde1103703
                                                                                                                                                                                                  • Instruction ID: 952e72079c3644e177760e53c95fce53e74d652183a93c28e2bbc6a3a1f8b65f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 55b4d9a85e04e168b5b4060a8a727da619c1e8e7f7e96e583f47cfbde1103703
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 27F01D7180428DABDB059FA1C806BBE7BB4FF04319F04800AF9A5A6192C7B9C611AF94
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00F311FC), ref: 00F310D4
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,00F311FC), ref: 00F310E9
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 81990902-0
                                                                                                                                                                                                  • Opcode ID: c5d8e4eefda6589e96fa28dd0c42e8de7c458dda7a915727a8bd005c7cdf3378
                                                                                                                                                                                                  • Instruction ID: 0102c58e26963407f72f2cc76c1b2eef562b314fdc49239c7d7d0ac12c392cf4
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c5d8e4eefda6589e96fa28dd0c42e8de7c458dda7a915727a8bd005c7cdf3378
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 49E0BF72018655AEF7252B52FC05F777BE9EB04320F14882DF5E5905B1DBA26C90EB50
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • Variable is not of type 'Object'., xrefs: 00F20C40
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID: Variable is not of type 'Object'.
                                                                                                                                                                                                  • API String ID: 0-1840281001
                                                                                                                                                                                                  • Opcode ID: 2e47a6b7b11a6075075b250757c094ca6cb69b6426cb2f7b35a554df05a0c265
                                                                                                                                                                                                  • Instruction ID: 6356978c7840109be0f4e6c7e91395cbcd7ae3a2c1624ba1272ca80d65769b46
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2e47a6b7b11a6075075b250757c094ca6cb69b6426cb2f7b35a554df05a0c265
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2432AB71A00219DBCF14DF90D880AEDB7B5FF04358F24506AE806BB392DB75AE46DB60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00F06766,?,?,00000008,?,?,00F0FEFE,00000000), ref: 00F06998
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ExceptionRaise
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3997070919-0
                                                                                                                                                                                                  • Opcode ID: 208570cf1bce4b46bd7d7eb919aa794d48d6a1c54225a6c1bb99091981c8146a
                                                                                                                                                                                                  • Instruction ID: 09868b170a919d9a39bff20d225915c3aa76d70dea8b8a0dd20e54f88c1f3d17
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 208570cf1bce4b46bd7d7eb919aa794d48d6a1c54225a6c1bb99091981c8146a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 44B11A32A106099FDB15CF28C486B657BE0FF45364F25C658E899CF2E2C735E9A1EB40
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 0-3916222277
                                                                                                                                                                                                  • Opcode ID: fd9ce78d3e7e4218576be40bfcb13bf718711269a1f59463d1dc779781af1d59
                                                                                                                                                                                                  • Instruction ID: bb6622126a5f623fa322de1fc57f41f1788b2417ebe3c76e55a77172cd065c6c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: fd9ce78d3e7e4218576be40bfcb13bf718711269a1f59463d1dc779781af1d59
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 12126D71D002299BCB24CF59D8816EEB7F5FF48710F1481AAE849EB255EB349E81DF90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • BlockInput.USER32(00000001), ref: 00F4EABD
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: BlockInput
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3456056419-0
                                                                                                                                                                                                  • Opcode ID: d97f3fa3a15e270877c4908560d9a3404eb899b4684e67f56e9fd6cac4767d0e
                                                                                                                                                                                                  • Instruction ID: 93d6a1cccc02ecb14c94016dd8e2192c68711ba3865e711b15aca7900ffca234
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d97f3fa3a15e270877c4908560d9a3404eb899b4684e67f56e9fd6cac4767d0e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 15E01A322002059FC710EF59D804E9ABBE9FF98760F008416FD49D7361DAB4A8419B90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00EF03EE), ref: 00EF09DA
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ExceptionFilterUnhandled
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3192549508-0
                                                                                                                                                                                                  • Opcode ID: 45f41cb9d30a011fcbb4f066444503ea975914218e8277e0bae532daa80a60de
                                                                                                                                                                                                  • Instruction ID: 181d665e8ec61d74d85bdf618e852c60f624492ff28b67659bac1842816d46ec
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 45f41cb9d30a011fcbb4f066444503ea975914218e8277e0bae532daa80a60de
                                                                                                                                                                                                  • Instruction Fuzzy Hash:
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                  • API String ID: 0-4108050209
                                                                                                                                                                                                  • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                  • Instruction ID: a92c9981514009ed00ebb1a0256099c12046bab7b1ce0c09543b894a5449470e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0E51972160CB9D5BDB3C8968895A7FF63D59B82388F583509DBC2F7282C671DE42C352
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: bb65ad41b5de47e9b31795b5b0363023d55b7f1a7ade5d6cfe2e3a5067a985e5
                                                                                                                                                                                                  • Instruction ID: 56515138ecb8dab8ed2570f08ac05815044e261c72a01b7a6bbcdcf20fa24b25
                                                                                                                                                                                                  • Opcode Fuzzy Hash: bb65ad41b5de47e9b31795b5b0363023d55b7f1a7ade5d6cfe2e3a5067a985e5
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 11325622D29F014DD763A634CC22335A289AFB73D5F24C737F81AB59A6EB29D4C36101
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 74d9813d1a3297711a5693dfb1062004a6f7d5cc841da4cea3a97c90a8ca23b9
                                                                                                                                                                                                  • Instruction ID: ae184251ea413e7a495cf2e64f13d0e3ef00b07d3bbdd3d5dd44d6900d6dfad3
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 74d9813d1a3297711a5693dfb1062004a6f7d5cc841da4cea3a97c90a8ca23b9
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DB321B32E001A98BCF24CF29D494A7DBBA1EF45314F398566E4599B291D234DD82FB81
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 91a1c9ad2070f32eef68f4e472e857e531dcfb4f5b5ff7373838accedb6bbefb
                                                                                                                                                                                                  • Instruction ID: 9c518917aff2328750d28a62f7badeb6b0b8a6ae7681c69a012e4e329f845b16
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 91a1c9ad2070f32eef68f4e472e857e531dcfb4f5b5ff7373838accedb6bbefb
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F322AD70A00609DFDF14CF65C881AEEB3F2FF84714F14562AE852AB391EB36A951DB50
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: f1b680b9dc2d468669172e3f187f7ab44c93cb845fd294ee8ba774c5cf1c473a
                                                                                                                                                                                                  • Instruction ID: eec44ad9ef0dc50b52eab0484b8b7626b7aeee1232dbe2c948d1d2b4e2e778eb
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f1b680b9dc2d468669172e3f187f7ab44c93cb845fd294ee8ba774c5cf1c473a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 450294B1E00209EBDB04DF65D881AEDB7F5FF44310F108169E816AB391EB35AE51DB91
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: e0c41a11f63c016edc9b95aa318eb5e7a6aa0e5c5d57535a829d94830a789736
                                                                                                                                                                                                  • Instruction ID: d68e92638beea8109fc282dd3242a897d545aba697145df6b585ca7c7f9396ca
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e0c41a11f63c016edc9b95aa318eb5e7a6aa0e5c5d57535a829d94830a789736
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 38B12420D2AF455DD36396398831336B64CAFBB2D5F91D31BFC1A74D62EB2285C36142
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                  • Instruction ID: b1f0e59305417244fac54e61223901341bccdf330597436db8af177781387140
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9F9187322080EF8ADB2D463A857407DFFF15A923A631A17DED5F2EA1C5FE20C954D620
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                  • Instruction ID: 1e554a8d24fc0899581bc2f37216fc7d6da3e645634ca758d67d7e0418afc29e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 369197732090AB4ADB2D423A843407EFFE15A923A531A17DDD7F2EB1C5EF24C954E620
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                  • Instruction ID: c8ee3052a579368caa79b7682c51fe67d8ed0c406831348d572c51526a8bc2e1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CD91B5322090EFCADB2D427A847407DFFE15A923A631A27DED5F2EA1C1FE14C554D620
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 8403f338f52c25627e982770ab8ccabe4957e9107acee97cf14fd0dc5e862d24
                                                                                                                                                                                                  • Instruction ID: 34f76bc9a9ec9898172af6e81ef0f97eeb7ef35f68e169e3279a6c2fe9475481
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8403f338f52c25627e982770ab8ccabe4957e9107acee97cf14fd0dc5e862d24
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7961693120CB0D96EA349A2C8D95BFE63D6DF46748F10391AEBC2FB281D6719E42C355
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 2dbc34f3154470def41ff1d5e99be9abf3fe889dc498ae2000d3fe5789c48d16
                                                                                                                                                                                                  • Instruction ID: f1aa3a60e105e459b74c25200d02a39518aae88d294e18ebb1dac66cb723b41d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2dbc34f3154470def41ff1d5e99be9abf3fe889dc498ae2000d3fe5789c48d16
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B161453160860D56DE384A285955BFE2389AF8370CF90795EEBC2FB281DA73AD42C255
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                  • Instruction ID: f32be379848177f04914006fa322859e0ad3ae6796c7c28f3934791fc7adb1ac
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9681A7336080EF89DB2D423A853407EFFE15A923A531A17DED5F6EB1C1EE24C654E660
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 1b818d0d3409f243890469083013c55be23edd88466f56792d28f496bde12825
                                                                                                                                                                                                  • Instruction ID: 3b4bf5b91dbad763819038f7dc6582a3e51aef366ff12b32c070c5d343f3e23f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1b818d0d3409f243890469083013c55be23edd88466f56792d28f496bde12825
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6921D2727216158BDB28CF7DC82267E77E5A754320F148A2EE4A7C37D0DE39A904DB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00F52B30
                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00F52B43
                                                                                                                                                                                                  • DestroyWindow.USER32 ref: 00F52B52
                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00F52B6D
                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 00F52B74
                                                                                                                                                                                                  • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00F52CA3
                                                                                                                                                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00F52CB1
                                                                                                                                                                                                  • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52CF8
                                                                                                                                                                                                  • GetClientRect.USER32(00000000,?), ref: 00F52D04
                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00F52D40
                                                                                                                                                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52D62
                                                                                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52D75
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52D80
                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00F52D89
                                                                                                                                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52D98
                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00F52DA1
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52DA8
                                                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00F52DB3
                                                                                                                                                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52DC5
                                                                                                                                                                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,00F6FC38,00000000), ref: 00F52DDB
                                                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00F52DEB
                                                                                                                                                                                                  • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00F52E11
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00F52E30
                                                                                                                                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F52E52
                                                                                                                                                                                                  • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00F5303F
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                                                                                                  • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                                                                                                  • API String ID: 2211948467-2373415609
                                                                                                                                                                                                  • Opcode ID: b0261d76fb52950f40ddff1be7e2b79bf3df8ea48454e244aba947706ed2e706
                                                                                                                                                                                                  • Instruction ID: 0c86732f16a87d576cc7ffb8159e6fec78986250b110cc5139c06e68623ffcc0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b0261d76fb52950f40ddff1be7e2b79bf3df8ea48454e244aba947706ed2e706
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BD028D71A00209EFDB14DF64DC89EAE7BB9FB49311F008219F955AB2A1D770ED05DBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetTextColor.GDI32(?,00000000), ref: 00F6712F
                                                                                                                                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00F67160
                                                                                                                                                                                                  • GetSysColor.USER32(0000000F), ref: 00F6716C
                                                                                                                                                                                                  • SetBkColor.GDI32(?,000000FF), ref: 00F67186
                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 00F67195
                                                                                                                                                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 00F671C0
                                                                                                                                                                                                  • GetSysColor.USER32(00000010), ref: 00F671C8
                                                                                                                                                                                                  • CreateSolidBrush.GDI32(00000000), ref: 00F671CF
                                                                                                                                                                                                  • FrameRect.USER32(?,?,00000000), ref: 00F671DE
                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00F671E5
                                                                                                                                                                                                  • InflateRect.USER32(?,000000FE,000000FE), ref: 00F67230
                                                                                                                                                                                                  • FillRect.USER32(?,?,?), ref: 00F67262
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00F67284
                                                                                                                                                                                                    • Part of subcall function 00F673E8: GetSysColor.USER32(00000012), ref: 00F67421
                                                                                                                                                                                                    • Part of subcall function 00F673E8: SetTextColor.GDI32(?,?), ref: 00F67425
                                                                                                                                                                                                    • Part of subcall function 00F673E8: GetSysColorBrush.USER32(0000000F), ref: 00F6743B
                                                                                                                                                                                                    • Part of subcall function 00F673E8: GetSysColor.USER32(0000000F), ref: 00F67446
                                                                                                                                                                                                    • Part of subcall function 00F673E8: GetSysColor.USER32(00000011), ref: 00F67463
                                                                                                                                                                                                    • Part of subcall function 00F673E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F67471
                                                                                                                                                                                                    • Part of subcall function 00F673E8: SelectObject.GDI32(?,00000000), ref: 00F67482
                                                                                                                                                                                                    • Part of subcall function 00F673E8: SetBkColor.GDI32(?,00000000), ref: 00F6748B
                                                                                                                                                                                                    • Part of subcall function 00F673E8: SelectObject.GDI32(?,?), ref: 00F67498
                                                                                                                                                                                                    • Part of subcall function 00F673E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00F674B7
                                                                                                                                                                                                    • Part of subcall function 00F673E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F674CE
                                                                                                                                                                                                    • Part of subcall function 00F673E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00F674DB
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4124339563-0
                                                                                                                                                                                                  • Opcode ID: 6568d1eabfd714e0b9fcbdd4874005e95e0bb1d9c51a7ef2a2e068b5844771b1
                                                                                                                                                                                                  • Instruction ID: e59a5af441bd96e5f136d294fa102da0f399903eb12b5e036ae905143d10ae29
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6568d1eabfd714e0b9fcbdd4874005e95e0bb1d9c51a7ef2a2e068b5844771b1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D2A18072408305AFDB00AF60DC48A6B7BA9FF49324F140A19F9E2961E1D7B5E944EF91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DestroyWindow.USER32(?,?), ref: 00EE8E14
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001308,?,00000000), ref: 00F26AC5
                                                                                                                                                                                                  • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00F26AFE
                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00F26F43
                                                                                                                                                                                                    • Part of subcall function 00EE8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00EE8BE8,?,00000000,?,?,?,?,00EE8BBA,00000000,?), ref: 00EE8FC5
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001053), ref: 00F26F7F
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00F26F96
                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(00000000,?), ref: 00F26FAC
                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(00000000,?), ref: 00F26FB7
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                  • API String ID: 2760611726-4108050209
                                                                                                                                                                                                  • Opcode ID: ef96aeb03ddee60bfe66ad875424115251f06b688c09932458f4bdfa77b3c27e
                                                                                                                                                                                                  • Instruction ID: 8b9b506cf418d0cf326ff56afcd3a57384ee107ec0d1ca245aae96a768cbf887
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ef96aeb03ddee60bfe66ad875424115251f06b688c09932458f4bdfa77b3c27e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9B12DD30A00269EFDB25DF24ED44BAAB7E1FB49320F144069F499DB261CB31EC51EB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DestroyWindow.USER32(00000000), ref: 00F5273E
                                                                                                                                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00F5286A
                                                                                                                                                                                                  • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00F528A9
                                                                                                                                                                                                  • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00F528B9
                                                                                                                                                                                                  • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00F52900
                                                                                                                                                                                                  • GetClientRect.USER32(00000000,?), ref: 00F5290C
                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00F52955
                                                                                                                                                                                                  • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00F52964
                                                                                                                                                                                                  • GetStockObject.GDI32(00000011), ref: 00F52974
                                                                                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00F52978
                                                                                                                                                                                                  • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00F52988
                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F52991
                                                                                                                                                                                                  • DeleteDC.GDI32(00000000), ref: 00F5299A
                                                                                                                                                                                                  • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00F529C6
                                                                                                                                                                                                  • SendMessageW.USER32(00000030,00000000,00000001), ref: 00F529DD
                                                                                                                                                                                                  • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00F52A1D
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00F52A31
                                                                                                                                                                                                  • SendMessageW.USER32(00000404,00000001,00000000), ref: 00F52A42
                                                                                                                                                                                                  • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00F52A77
                                                                                                                                                                                                  • GetStockObject.GDI32(00000011), ref: 00F52A82
                                                                                                                                                                                                  • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00F52A8D
                                                                                                                                                                                                  • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00F52A97
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                                                                                                  • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                                                                                                  • API String ID: 2910397461-517079104
                                                                                                                                                                                                  • Opcode ID: 4c3528fb6d0b53670b13550925a2cc1604780e762f33ab7f36ffd712371c9274
                                                                                                                                                                                                  • Instruction ID: 086d8a2396bc51a819d1b1bdc61b2a0f94656c8f69df283eefb74347129f380e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4c3528fb6d0b53670b13550925a2cc1604780e762f33ab7f36ffd712371c9274
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9AB15CB1A00219AFEB14DFA8DC45EAA7BB9FB09711F004215FA54E7290D7B4ED40DB94
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00F44AED
                                                                                                                                                                                                  • GetDriveTypeW.KERNEL32(?,00F6CB68,?,\\.\,00F6CC08), ref: 00F44BCA
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,00F6CB68,?,\\.\,00F6CC08), ref: 00F44D36
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorMode$DriveType
                                                                                                                                                                                                  • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                                                                                                  • API String ID: 2907320926-4222207086
                                                                                                                                                                                                  • Opcode ID: 01d9a823df652e420ecf56d4943ebdf0770aa93e022fa53bc6a5aaffd09df889
                                                                                                                                                                                                  • Instruction ID: c28cc5122e4b9ab6f19196f912a5e163628c20aa384997e298705a2221f3ec86
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 01d9a823df652e420ecf56d4943ebdf0770aa93e022fa53bc6a5aaffd09df889
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BD619E31A051069BDF04DB24CAC2B69BBA0EB44355B284016FD16FB6D2EB35FD41BB82
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetSysColor.USER32(00000012), ref: 00F67421
                                                                                                                                                                                                  • SetTextColor.GDI32(?,?), ref: 00F67425
                                                                                                                                                                                                  • GetSysColorBrush.USER32(0000000F), ref: 00F6743B
                                                                                                                                                                                                  • GetSysColor.USER32(0000000F), ref: 00F67446
                                                                                                                                                                                                  • CreateSolidBrush.GDI32(?), ref: 00F6744B
                                                                                                                                                                                                  • GetSysColor.USER32(00000011), ref: 00F67463
                                                                                                                                                                                                  • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00F67471
                                                                                                                                                                                                  • SelectObject.GDI32(?,00000000), ref: 00F67482
                                                                                                                                                                                                  • SetBkColor.GDI32(?,00000000), ref: 00F6748B
                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 00F67498
                                                                                                                                                                                                  • InflateRect.USER32(?,000000FF,000000FF), ref: 00F674B7
                                                                                                                                                                                                  • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00F674CE
                                                                                                                                                                                                  • GetWindowLongW.USER32(00000000,000000F0), ref: 00F674DB
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00F6752A
                                                                                                                                                                                                  • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00F67554
                                                                                                                                                                                                  • InflateRect.USER32(?,000000FD,000000FD), ref: 00F67572
                                                                                                                                                                                                  • DrawFocusRect.USER32(?,?), ref: 00F6757D
                                                                                                                                                                                                  • GetSysColor.USER32(00000011), ref: 00F6758E
                                                                                                                                                                                                  • SetTextColor.GDI32(?,00000000), ref: 00F67596
                                                                                                                                                                                                  • DrawTextW.USER32(?,00F670F5,000000FF,?,00000000), ref: 00F675A8
                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 00F675BF
                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 00F675CA
                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 00F675D0
                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 00F675D5
                                                                                                                                                                                                  • SetTextColor.GDI32(?,?), ref: 00F675DB
                                                                                                                                                                                                  • SetBkColor.GDI32(?,?), ref: 00F675E5
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1996641542-0
                                                                                                                                                                                                  • Opcode ID: 993657e12ff87ce1a49ab4091ceb28fa78b8721335adc59a48f4454420f07246
                                                                                                                                                                                                  • Instruction ID: 95cdae00cf1839c9bba15b8cb1a25b3db2878e2d2f7183473854ca7730b501ef
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 993657e12ff87ce1a49ab4091ceb28fa78b8721335adc59a48f4454420f07246
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B2616E72D00218AFDF01AFA4DC49AAE7FB9EF09320F144115F965AB2A1D7B59D40EF90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00F61128
                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00F6113D
                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 00F61144
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00F61199
                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 00F611B9
                                                                                                                                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00F611ED
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F6120B
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00F6121D
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000421,?,?), ref: 00F61232
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00F61245
                                                                                                                                                                                                  • IsWindowVisible.USER32(00000000), ref: 00F612A1
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00F612BC
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00F612D0
                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00F612E8
                                                                                                                                                                                                  • MonitorFromPoint.USER32(?,?,00000002), ref: 00F6130E
                                                                                                                                                                                                  • GetMonitorInfoW.USER32(00000000,?), ref: 00F61328
                                                                                                                                                                                                  • CopyRect.USER32(?,?), ref: 00F6133F
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000412,00000000), ref: 00F613AA
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                                                                                                  • String ID: ($0$tooltips_class32
                                                                                                                                                                                                  • API String ID: 698492251-4156429822
                                                                                                                                                                                                  • Opcode ID: 9c04c7663fbbb88e0b2d01831cd60afca18184d327ae90cd14431435d9eec403
                                                                                                                                                                                                  • Instruction ID: 10616a9f9a3630fd2ced416fc8d683cc2caaf8523b966a9ba805e5d9dbcf92a7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9c04c7663fbbb88e0b2d01831cd60afca18184d327ae90cd14431435d9eec403
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F5B1BD71604341AFDB00DF64C885B6ABBE4FF88310F04891DF99AAB2A1D771EC45DB96
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00EE8968
                                                                                                                                                                                                  • GetSystemMetrics.USER32(00000007), ref: 00EE8970
                                                                                                                                                                                                  • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00EE899B
                                                                                                                                                                                                  • GetSystemMetrics.USER32(00000008), ref: 00EE89A3
                                                                                                                                                                                                  • GetSystemMetrics.USER32(00000004), ref: 00EE89C8
                                                                                                                                                                                                  • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00EE89E5
                                                                                                                                                                                                  • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00EE89F5
                                                                                                                                                                                                  • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00EE8A28
                                                                                                                                                                                                  • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00EE8A3C
                                                                                                                                                                                                  • GetClientRect.USER32(00000000,000000FF), ref: 00EE8A5A
                                                                                                                                                                                                  • GetStockObject.GDI32(00000011), ref: 00EE8A76
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 00EE8A81
                                                                                                                                                                                                    • Part of subcall function 00EE912D: GetCursorPos.USER32(?), ref: 00EE9141
                                                                                                                                                                                                    • Part of subcall function 00EE912D: ScreenToClient.USER32(00000000,?), ref: 00EE915E
                                                                                                                                                                                                    • Part of subcall function 00EE912D: GetAsyncKeyState.USER32(00000001), ref: 00EE9183
                                                                                                                                                                                                    • Part of subcall function 00EE912D: GetAsyncKeyState.USER32(00000002), ref: 00EE919D
                                                                                                                                                                                                  • SetTimer.USER32(00000000,00000000,00000028,00EE90FC), ref: 00EE8AA8
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                                                                                                  • String ID: AutoIt v3 GUI
                                                                                                                                                                                                  • API String ID: 1458621304-248962490
                                                                                                                                                                                                  • Opcode ID: 5c42a35854cf699ddd9f87f55dffe343147775daa1f2cb2d6588c6d8e34bb507
                                                                                                                                                                                                  • Instruction ID: ef9c49e6b8bb97d0177b7488b9c381b82cae464bbc08453372fd8d384bec3377
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5c42a35854cf699ddd9f87f55dffe343147775daa1f2cb2d6588c6d8e34bb507
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6FB19B75A0024D9FDB14DFA8DD45BAE3BB4FB48314F114229FA59E7290DB74E840DB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F310F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F31114
                                                                                                                                                                                                    • Part of subcall function 00F310F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F31120
                                                                                                                                                                                                    • Part of subcall function 00F310F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F3112F
                                                                                                                                                                                                    • Part of subcall function 00F310F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F31136
                                                                                                                                                                                                    • Part of subcall function 00F310F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F3114D
                                                                                                                                                                                                  • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00F30DF5
                                                                                                                                                                                                  • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00F30E29
                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00F30E40
                                                                                                                                                                                                  • GetAce.ADVAPI32(?,00000000,?), ref: 00F30E7A
                                                                                                                                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00F30E96
                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?), ref: 00F30EAD
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00F30EB5
                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00F30EBC
                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00F30EDD
                                                                                                                                                                                                  • CopySid.ADVAPI32(00000000), ref: 00F30EE4
                                                                                                                                                                                                  • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00F30F13
                                                                                                                                                                                                  • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00F30F35
                                                                                                                                                                                                  • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00F30F47
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F30F6E
                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00F30F75
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F30F7E
                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00F30F85
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F30F8E
                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00F30F95
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00F30FA1
                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00F30FA8
                                                                                                                                                                                                    • Part of subcall function 00F31193: GetProcessHeap.KERNEL32(00000008,00F30BB1,?,00000000,?,00F30BB1,?), ref: 00F311A1
                                                                                                                                                                                                    • Part of subcall function 00F31193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00F30BB1,?), ref: 00F311A8
                                                                                                                                                                                                    • Part of subcall function 00F31193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00F30BB1,?), ref: 00F311B7
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4175595110-0
                                                                                                                                                                                                  • Opcode ID: 51f9aeb74439b869961610d3ae93862826ad9b4ff286b8ab5bd129d8f9fa0002
                                                                                                                                                                                                  • Instruction ID: c2b581b5f79184e366df98509d8c16335647d2c528b1c76ecfc62cb8569e429a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 51f9aeb74439b869961610d3ae93862826ad9b4ff286b8ab5bd129d8f9fa0002
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D0715E7290020AEBDF209FA5DC44FEEBBB8FF05720F144116F9A9E6191DB719905DBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F5C4BD
                                                                                                                                                                                                  • RegCreateKeyExW.ADVAPI32(?,?,00000000,00F6CC08,00000000,?,00000000,?,?), ref: 00F5C544
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00F5C5A4
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F5C5F4
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F5C66F
                                                                                                                                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00F5C6B2
                                                                                                                                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00F5C7C1
                                                                                                                                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00F5C84D
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00F5C881
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00F5C88E
                                                                                                                                                                                                  • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00F5C960
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                                                                                                                  • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                                                                                                  • API String ID: 9721498-966354055
                                                                                                                                                                                                  • Opcode ID: f0aeae479169b6c61d90039661924aa95e2c8be8dcce473794d90aa1d5f246d3
                                                                                                                                                                                                  • Instruction ID: 7c90732ae286da755caa495000f02ab75b192bb3adec16786958c813f63cd6f9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f0aeae479169b6c61d90039661924aa95e2c8be8dcce473794d90aa1d5f246d3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 01127C356043019FD714DF14C881A2AB7E5FF88725F14885DF98AAB3A2DB31ED46DB81
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,?), ref: 00F609C6
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F60A01
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F60A54
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F60A8A
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F60B06
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F60B81
                                                                                                                                                                                                    • Part of subcall function 00EEF9F2: _wcslen.LIBCMT ref: 00EEF9FD
                                                                                                                                                                                                    • Part of subcall function 00F32BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00F32BFA
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                  • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                                                                                                  • API String ID: 1103490817-4258414348
                                                                                                                                                                                                  • Opcode ID: cf57a407cddc535183720c080aea4067b6c870e3042e436d34afd0e129dfd5a5
                                                                                                                                                                                                  • Instruction ID: b5f11303fd24351ea34e4c5c3d82153bb35fb86780fbd90d2fe0fe032efef29b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: cf57a407cddc535183720c080aea4067b6c870e3042e436d34afd0e129dfd5a5
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A2E17D326083019FCB14DF64C45092BB7E2FF94364B24895DF896AB3A2DB31ED45EB81
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                  • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                                                                                                  • API String ID: 1256254125-909552448
                                                                                                                                                                                                  • Opcode ID: 3eb1e758bed6daea063360a0209dcabb30f6399a109765ec42724434616d05de
                                                                                                                                                                                                  • Instruction ID: 15a42c97b7e485e5712538318ef69d809dfcc08236e97f0242d6e2d64ba73dfa
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3eb1e758bed6daea063360a0209dcabb30f6399a109765ec42724434616d05de
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3E711633A0036A8FCF20DE78CD515BB3791ABA1765B150128FE57A7285E635CD49E3D0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F6835A
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F6836E
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F68391
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F683B4
                                                                                                                                                                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00F683F2
                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00F6361A,?), ref: 00F6844E
                                                                                                                                                                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F68487
                                                                                                                                                                                                  • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00F684CA
                                                                                                                                                                                                  • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00F68501
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(?), ref: 00F6850D
                                                                                                                                                                                                  • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00F6851D
                                                                                                                                                                                                  • DestroyIcon.USER32(?), ref: 00F6852C
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00F68549
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00F68555
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                                                                                                                  • String ID: .dll$.exe$.icl
                                                                                                                                                                                                  • API String ID: 799131459-1154884017
                                                                                                                                                                                                  • Opcode ID: c25f831aea5cb8ebf27635703ebad5902a6127db4a743e3d675778b38b776dc0
                                                                                                                                                                                                  • Instruction ID: 74678b385eccf1d989c9b986ef05d0f7f4ba2298995b650c6bed0c35f2fbc719
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c25f831aea5cb8ebf27635703ebad5902a6127db4a743e3d675778b38b776dc0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1961DF71900209BAEB14DF64CC41BBE77A8FB04760F10460AF956E61D1EFB4AE81E7A0
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                                                                                                                                  • API String ID: 0-1645009161
                                                                                                                                                                                                  • Opcode ID: c116a6141ab8577096fb456156e185171bf3f3c0f975fed9391c6f914753ee63
                                                                                                                                                                                                  • Instruction ID: 1167e74aad5e89a17e9bac8e8706659affb9e4d20f341153a49ced8dcc0ad10a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c116a6141ab8577096fb456156e185171bf3f3c0f975fed9391c6f914753ee63
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FD810771A04205BBDB21AF60DD42FFE37A4EF95700F045426F945BA292FB70D942E7A1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CharLowerBuffW.USER32(?,?), ref: 00F43EF8
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F43F03
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F43F5A
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F43F98
                                                                                                                                                                                                  • GetDriveTypeW.KERNEL32(?), ref: 00F43FD6
                                                                                                                                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F4401E
                                                                                                                                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F44059
                                                                                                                                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F44087
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                  • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                                                                                                  • API String ID: 1839972693-4113822522
                                                                                                                                                                                                  • Opcode ID: 55f79e4524c08b1891b88c8c9de0026c3e007aecde347687098a2bc8144422f3
                                                                                                                                                                                                  • Instruction ID: 035388609549f6e695b949d5db4a9f4303f283cd047d24ffd1b08ce6c8bf6940
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 55f79e4524c08b1891b88c8c9de0026c3e007aecde347687098a2bc8144422f3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3271E472A042029FC714DF24C88196ABBF4EF94768F10492DF895E7251E731ED4ADB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • LoadIconW.USER32(00000063), ref: 00F35A2E
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00F35A40
                                                                                                                                                                                                  • SetWindowTextW.USER32(?,?), ref: 00F35A57
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 00F35A6C
                                                                                                                                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00F35A72
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00F35A82
                                                                                                                                                                                                  • SetWindowTextW.USER32(00000000,?), ref: 00F35A88
                                                                                                                                                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00F35AA9
                                                                                                                                                                                                  • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00F35AC3
                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00F35ACC
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F35B33
                                                                                                                                                                                                  • SetWindowTextW.USER32(?,?), ref: 00F35B6F
                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00F35B75
                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 00F35B7C
                                                                                                                                                                                                  • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00F35BD3
                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 00F35BE0
                                                                                                                                                                                                  • PostMessageW.USER32(?,00000005,00000000,?), ref: 00F35C05
                                                                                                                                                                                                  • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00F35C2F
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 895679908-0
                                                                                                                                                                                                  • Opcode ID: db0ceaacb9cd0b4a5a799ff8e31125e308fb178dedc7674d64c273cd6da20487
                                                                                                                                                                                                  • Instruction ID: 0285b1c2747aafd5e672e7cba7d0837ef1a4e37c0c3330c321161a5ed7fb37d4
                                                                                                                                                                                                  • Opcode Fuzzy Hash: db0ceaacb9cd0b4a5a799ff8e31125e308fb178dedc7674d64c273cd6da20487
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0D719031900B09AFDB20DFA8CE45B6EBBF5FF88B24F104518E596A35A0D775E940EB50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F89), ref: 00F4FE27
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F8A), ref: 00F4FE32
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F00), ref: 00F4FE3D
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F03), ref: 00F4FE48
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F8B), ref: 00F4FE53
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F01), ref: 00F4FE5E
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F81), ref: 00F4FE69
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F88), ref: 00F4FE74
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F80), ref: 00F4FE7F
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F86), ref: 00F4FE8A
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F83), ref: 00F4FE95
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F85), ref: 00F4FEA0
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F82), ref: 00F4FEAB
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F84), ref: 00F4FEB6
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F04), ref: 00F4FEC1
                                                                                                                                                                                                  • LoadCursorW.USER32(00000000,00007F02), ref: 00F4FECC
                                                                                                                                                                                                  • GetCursorInfo.USER32(?), ref: 00F4FEDC
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00F4FF1E
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Cursor$Load$ErrorInfoLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3215588206-0
                                                                                                                                                                                                  • Opcode ID: da09a1f25e2396522d7880fc563608efe255d0d1e92906e1eaad401cfade7749
                                                                                                                                                                                                  • Instruction ID: d6bbde4db04f3e7de044d3b32931d378e9806d88f490ffcfb7a12a77b2f8e3e1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: da09a1f25e2396522d7880fc563608efe255d0d1e92906e1eaad401cfade7749
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FF4154B0D043196BDB109FBA8C8585EBFE8FF04364B54452AE51DEB281DB789905CE91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00EF00C6
                                                                                                                                                                                                    • Part of subcall function 00EF00ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00FA070C,00000FA0,D946BF9B,?,?,?,?,00F123B3,000000FF), ref: 00EF011C
                                                                                                                                                                                                    • Part of subcall function 00EF00ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00F123B3,000000FF), ref: 00EF0127
                                                                                                                                                                                                    • Part of subcall function 00EF00ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00F123B3,000000FF), ref: 00EF0138
                                                                                                                                                                                                    • Part of subcall function 00EF00ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00EF014E
                                                                                                                                                                                                    • Part of subcall function 00EF00ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00EF015C
                                                                                                                                                                                                    • Part of subcall function 00EF00ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00EF016A
                                                                                                                                                                                                    • Part of subcall function 00EF00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00EF0195
                                                                                                                                                                                                    • Part of subcall function 00EF00ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00EF01A0
                                                                                                                                                                                                  • ___scrt_fastfail.LIBCMT ref: 00EF00E7
                                                                                                                                                                                                    • Part of subcall function 00EF00A3: __onexit.LIBCMT ref: 00EF00A9
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • kernel32.dll, xrefs: 00EF0133
                                                                                                                                                                                                  • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00EF0122
                                                                                                                                                                                                  • InitializeConditionVariable, xrefs: 00EF0148
                                                                                                                                                                                                  • WakeAllConditionVariable, xrefs: 00EF0162
                                                                                                                                                                                                  • SleepConditionVariableCS, xrefs: 00EF0154
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                                                                                                                  • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                                                                                                  • API String ID: 66158676-1714406822
                                                                                                                                                                                                  • Opcode ID: a4e536a06c97184892f9ce4734c9174c7ec46bfaaee265ccb0671f5cb1a42a8f
                                                                                                                                                                                                  • Instruction ID: 57502f9efe00425b4c2493b83a013a4acbb9f1474c9a0bbf7e50f0610bd9ccc9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a4e536a06c97184892f9ce4734c9174c7ec46bfaaee265ccb0671f5cb1a42a8f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F2210B7264575D6BD7106BA4BC05B7A33D4DB06B65F001536F991F3292DFB0EC00AAD1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen
                                                                                                                                                                                                  • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                                                                                                                  • API String ID: 176396367-1603158881
                                                                                                                                                                                                  • Opcode ID: 2bd4f7d2126f074d3d960c1104af83735b18b00245ad418acedeca14f9f830b7
                                                                                                                                                                                                  • Instruction ID: b9cb3b72a801a791c5153dafa50f390a56b8b2fa2a296080d1fda5e4bf19d178
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2bd4f7d2126f074d3d960c1104af83735b18b00245ad418acedeca14f9f830b7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 48E1B232E00516ABDB19DFB8C8517FEBBB0BF54730F54812AE456B7241DB30AE85A790
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CharLowerBuffW.USER32(00000000,00000000,00F6CC08), ref: 00F44527
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F4453B
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F44599
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F445F4
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F4463F
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F446A7
                                                                                                                                                                                                    • Part of subcall function 00EEF9F2: _wcslen.LIBCMT ref: 00EEF9FD
                                                                                                                                                                                                  • GetDriveTypeW.KERNEL32(?,00F96BF0,00000061), ref: 00F44743
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                  • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                                                                                                  • API String ID: 2055661098-1000479233
                                                                                                                                                                                                  • Opcode ID: 1ed50d2644b24ba6691015a135ff2501379b432ea6239faca09053d6a59aa6af
                                                                                                                                                                                                  • Instruction ID: 6120e09cb9b0e373f7a5d7e48a60bc90a61b0e7615c87ab9a2ce44657772c59a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1ed50d2644b24ba6691015a135ff2501379b432ea6239faca09053d6a59aa6af
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F6B1D171A083029BC710DF28C890B6ABBE5FFA5760F54491DF896E7291E730E845DA92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,00F6CC08), ref: 00F540BB
                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00F540CD
                                                                                                                                                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00F6CC08), ref: 00F540F2
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,00F6CC08), ref: 00F5413E
                                                                                                                                                                                                  • StringFromGUID2.OLE32(?,?,00000028,?,00F6CC08), ref: 00F541A8
                                                                                                                                                                                                  • SysFreeString.OLEAUT32(00000009), ref: 00F54262
                                                                                                                                                                                                  • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00F542C8
                                                                                                                                                                                                  • SysFreeString.OLEAUT32(?), ref: 00F542F2
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                                                                                                                                  • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                                                                                                  • API String ID: 354098117-199464113
                                                                                                                                                                                                  • Opcode ID: 3fd0d6ba4a9111c2a6166ff2e83f4c0e2998dfe652bcc8fb7708d4dd8213d572
                                                                                                                                                                                                  • Instruction ID: 59b6e78d9d24cca8b5d9a0b384e18a7d2302cd34f16b7dfe26f5fa1f273ee28a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3fd0d6ba4a9111c2a6166ff2e83f4c0e2998dfe652bcc8fb7708d4dd8213d572
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D9125E71A00119EFDB14CF94C884EAEBBB5FF45319F248098EA459B261D731FD86DBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetMenuItemCount.USER32(00FA1990), ref: 00F12F8D
                                                                                                                                                                                                  • GetMenuItemCount.USER32(00FA1990), ref: 00F1303D
                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00F13081
                                                                                                                                                                                                  • SetForegroundWindow.USER32(00000000), ref: 00F1308A
                                                                                                                                                                                                  • TrackPopupMenuEx.USER32(00FA1990,00000000,?,00000000,00000000,00000000), ref: 00F1309D
                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00F130A9
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                  • API String ID: 36266755-4108050209
                                                                                                                                                                                                  • Opcode ID: f81a72acbff591c4c86e0e9dd83a49333256c0a24c916d4c2d3a7eb30d4d32d0
                                                                                                                                                                                                  • Instruction ID: 5be93fe1da513a440d94f39779d28c6988f8efc9b4e239624a9625e099b02ca7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f81a72acbff591c4c86e0e9dd83a49333256c0a24c916d4c2d3a7eb30d4d32d0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 99712C71A44209BEEB218F64CC49FEABF64FF04374F104206F5256A1E0C7B1AD60EB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DestroyWindow.USER32(00000000,?), ref: 00F66DEB
                                                                                                                                                                                                    • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00F66E5F
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00F66E81
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F66E94
                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 00F66EB5
                                                                                                                                                                                                  • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00ED0000,00000000), ref: 00F66EE4
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00F66EFD
                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00F66F16
                                                                                                                                                                                                  • GetWindowRect.USER32(00000000), ref: 00F66F1D
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00F66F35
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00F66F4D
                                                                                                                                                                                                    • Part of subcall function 00EE9944: GetWindowLongW.USER32(?,000000EB), ref: 00EE9952
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                                                                                                                  • String ID: 0$tooltips_class32
                                                                                                                                                                                                  • API String ID: 2429346358-3619404913
                                                                                                                                                                                                  • Opcode ID: eeb6990b4d05e7793ca6d189b8a06d1e037b0d45e5c39641b1435f04ae9b1d0d
                                                                                                                                                                                                  • Instruction ID: dcc9e1d808d33b971503c88aec0dc2608658658003b846215eb9e82e2e33ca7f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: eeb6990b4d05e7793ca6d189b8a06d1e037b0d45e5c39641b1435f04ae9b1d0d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 24718670504248AFEB20CF18D844FBABBE9FB99314F04041EF999C7261D771E906EB56
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                  • DragQueryPoint.SHELL32(?,?), ref: 00F69147
                                                                                                                                                                                                    • Part of subcall function 00F67674: ClientToScreen.USER32(?,?), ref: 00F6769A
                                                                                                                                                                                                    • Part of subcall function 00F67674: GetWindowRect.USER32(?,?), ref: 00F67710
                                                                                                                                                                                                    • Part of subcall function 00F67674: PtInRect.USER32(?,?,00F68B89), ref: 00F67720
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00F691B0
                                                                                                                                                                                                  • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00F691BB
                                                                                                                                                                                                  • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00F691DE
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00F69225
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00F6923E
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00F69255
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B1,?,?), ref: 00F69277
                                                                                                                                                                                                  • DragFinish.SHELL32(?), ref: 00F6927E
                                                                                                                                                                                                  • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00F69371
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                                                                                                                  • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                                                                                                                                  • API String ID: 221274066-3440237614
                                                                                                                                                                                                  • Opcode ID: b6e868ff4374c89e6bb12cf6f9082519ea493409d16c5e6ba44b9aeb1218858c
                                                                                                                                                                                                  • Instruction ID: fa8eaaaa3e3af55734ae0d71b7dfb550acdcb81d031c1220e95ba4297398e3dd
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b6e868ff4374c89e6bb12cf6f9082519ea493409d16c5e6ba44b9aeb1218858c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: EA618C71108305AFD701EF60DC85DAFBBE8EF89750F10091EF5A5A32A1DB709A49DB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F4C4B0
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00F4C4C3
                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00F4C4D7
                                                                                                                                                                                                  • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00F4C4F0
                                                                                                                                                                                                  • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00F4C533
                                                                                                                                                                                                  • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00F4C549
                                                                                                                                                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F4C554
                                                                                                                                                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00F4C584
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00F4C5DC
                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00F4C5F0
                                                                                                                                                                                                  • InternetCloseHandle.WININET(00000000), ref: 00F4C5FB
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3800310941-3916222277
                                                                                                                                                                                                  • Opcode ID: c9c1ac44113580ab6e099c32fbad9d5df4205e9a7ca0f57632f3ad77e91622df
                                                                                                                                                                                                  • Instruction ID: 8dc34aee79f9dd4f40cbecf82b2cf436e56ed6476741bda4db044681d44ed889
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c9c1ac44113580ab6e099c32fbad9d5df4205e9a7ca0f57632f3ad77e91622df
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6E516DB1501208BFDB619F60C948ABB7FFCFF08754F049419F99596210EB74E944ABA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00F68592
                                                                                                                                                                                                  • GetFileSize.KERNEL32(00000000,00000000), ref: 00F685A2
                                                                                                                                                                                                  • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00F685AD
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F685BA
                                                                                                                                                                                                  • GlobalLock.KERNEL32(00000000), ref: 00F685C8
                                                                                                                                                                                                  • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00F685D7
                                                                                                                                                                                                  • GlobalUnlock.KERNEL32(00000000), ref: 00F685E0
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F685E7
                                                                                                                                                                                                  • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00F685F8
                                                                                                                                                                                                  • OleLoadPicture.OLEAUT32(?,00000000,00000000,00F6FC38,?), ref: 00F68611
                                                                                                                                                                                                  • GlobalFree.KERNEL32(00000000), ref: 00F68621
                                                                                                                                                                                                  • GetObjectW.GDI32(?,00000018,000000FF), ref: 00F68641
                                                                                                                                                                                                  • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00F68671
                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00F68699
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00F686AF
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3840717409-0
                                                                                                                                                                                                  • Opcode ID: 4960ab8701eeeafe0e783caeee38debc78363fb7bda9aea9ee95b7c3ee120883
                                                                                                                                                                                                  • Instruction ID: 89825812c10b30f43f621bccc3e10db59b18d6d4050d63204810ebef9841b7bd
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4960ab8701eeeafe0e783caeee38debc78363fb7bda9aea9ee95b7c3ee120883
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 61416C71600208AFDB10DFA5CC48EBA7BB8FF89761F004119F996E7260DB719D01EB60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • VariantInit.OLEAUT32(00000000), ref: 00F41502
                                                                                                                                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 00F4150B
                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00F41517
                                                                                                                                                                                                  • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00F415FB
                                                                                                                                                                                                  • VarR8FromDec.OLEAUT32(?,?), ref: 00F41657
                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00F41708
                                                                                                                                                                                                  • SysFreeString.OLEAUT32(?), ref: 00F4178C
                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00F417D8
                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00F417E7
                                                                                                                                                                                                  • VariantInit.OLEAUT32(00000000), ref: 00F41823
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                                                                                                                                                  • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                                                                                                                                  • API String ID: 1234038744-3931177956
                                                                                                                                                                                                  • Opcode ID: 8453f6d63d5b25b7d719ef37752a2d64dae2f2feb35d373a178d7737c7a9879b
                                                                                                                                                                                                  • Instruction ID: d0f99cfd6c8738795dcbb37fa77eb612752162c3458b33ddb9aaa8604492d6cd
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8453f6d63d5b25b7d719ef37752a2d64dae2f2feb35d373a178d7737c7a9879b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 95D1D332A00119DBDB10EF65D885BB9BBF5FF44700F188156E846AB281DB74EC85EBA1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                    • Part of subcall function 00F5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F5B6AE,?,?), ref: 00F5C9B5
                                                                                                                                                                                                    • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5C9F1
                                                                                                                                                                                                    • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA68
                                                                                                                                                                                                    • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA9E
                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F5B6F4
                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F5B772
                                                                                                                                                                                                  • RegDeleteValueW.ADVAPI32(?,?), ref: 00F5B80A
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00F5B87E
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00F5B89C
                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00F5B8F2
                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00F5B904
                                                                                                                                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00F5B922
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00F5B983
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00F5B994
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                                                                                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                  • API String ID: 146587525-4033151799
                                                                                                                                                                                                  • Opcode ID: c2aefa1871da71e64476ec4d36859b146f1272bf3f8fcdd67e3bb6d6e786f0e2
                                                                                                                                                                                                  • Instruction ID: 591869343b57793529e6876d37b1fd197a45d074e580dd23ea3c317fae00bb32
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c2aefa1871da71e64476ec4d36859b146f1272bf3f8fcdd67e3bb6d6e786f0e2
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9CC18C30604201AFD710DF14C495F2ABBE1FF84319F18949DE99A9B3A2CB71EC4ADB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 00F525D8
                                                                                                                                                                                                  • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00F525E8
                                                                                                                                                                                                  • CreateCompatibleDC.GDI32(?), ref: 00F525F4
                                                                                                                                                                                                  • SelectObject.GDI32(00000000,?), ref: 00F52601
                                                                                                                                                                                                  • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00F5266D
                                                                                                                                                                                                  • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00F526AC
                                                                                                                                                                                                  • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00F526D0
                                                                                                                                                                                                  • SelectObject.GDI32(?,?), ref: 00F526D8
                                                                                                                                                                                                  • DeleteObject.GDI32(?), ref: 00F526E1
                                                                                                                                                                                                  • DeleteDC.GDI32(?), ref: 00F526E8
                                                                                                                                                                                                  • ReleaseDC.USER32(00000000,?), ref: 00F526F3
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                                                                                                                  • String ID: (
                                                                                                                                                                                                  • API String ID: 2598888154-3887548279
                                                                                                                                                                                                  • Opcode ID: 3076950a5e972ab03b8059aab3ed6e47f5d1901406f16b7d02bdc45a842cb842
                                                                                                                                                                                                  • Instruction ID: e35da207354a059ff5be93f9a82f0134fe8eaf4053ff8ae8e363e70f58ececc8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3076950a5e972ab03b8059aab3ed6e47f5d1901406f16b7d02bdc45a842cb842
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5261E275D00219EFCF04CFA8D984AAEBBF5FF48310F20852AEA95A7250D774A941DF90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • ___free_lconv_mon.LIBCMT ref: 00F0DAA1
                                                                                                                                                                                                    • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D659
                                                                                                                                                                                                    • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D66B
                                                                                                                                                                                                    • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D67D
                                                                                                                                                                                                    • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D68F
                                                                                                                                                                                                    • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D6A1
                                                                                                                                                                                                    • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D6B3
                                                                                                                                                                                                    • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D6C5
                                                                                                                                                                                                    • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D6D7
                                                                                                                                                                                                    • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D6E9
                                                                                                                                                                                                    • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D6FB
                                                                                                                                                                                                    • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D70D
                                                                                                                                                                                                    • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D71F
                                                                                                                                                                                                    • Part of subcall function 00F0D63C: _free.LIBCMT ref: 00F0D731
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0DA96
                                                                                                                                                                                                    • Part of subcall function 00F029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000), ref: 00F029DE
                                                                                                                                                                                                    • Part of subcall function 00F029C8: GetLastError.KERNEL32(00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000,00000000), ref: 00F029F0
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0DAB8
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0DACD
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0DAD8
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0DAFA
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0DB0D
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0DB1B
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0DB26
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0DB5E
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0DB65
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0DB82
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0DB9A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 161543041-0
                                                                                                                                                                                                  • Opcode ID: 40e298aab359105e97d9de93dfc1f824852cffcb8b8b17c664c5d412436e23b4
                                                                                                                                                                                                  • Instruction ID: 84ce9fade3f582fe4ff27133483d01ec8b776bff6dda228a217218dec167dd46
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 40e298aab359105e97d9de93dfc1f824852cffcb8b8b17c664c5d412436e23b4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1E314A71A042059FEB61AAB9EC49B5AB7E9FF40320F654419E449D71D2DB39EC80FB20
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00F3369C
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F336A7
                                                                                                                                                                                                  • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00F33797
                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00F3380C
                                                                                                                                                                                                  • GetDlgCtrlID.USER32(?), ref: 00F3385D
                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00F33882
                                                                                                                                                                                                  • GetParent.USER32(?), ref: 00F338A0
                                                                                                                                                                                                  • ScreenToClient.USER32(00000000), ref: 00F338A7
                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00F33921
                                                                                                                                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 00F3395D
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                                                                                                                                                  • String ID: %s%u
                                                                                                                                                                                                  • API String ID: 4010501982-679674701
                                                                                                                                                                                                  • Opcode ID: 980daacfe5c71e003227bef54d9236806a84a70bef3bf41f2ed545e517a1fee8
                                                                                                                                                                                                  • Instruction ID: 40251ee399b07277f13f5800ec3b69b7933d4332624e630de39adafe89873495
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 980daacfe5c71e003227bef54d9236806a84a70bef3bf41f2ed545e517a1fee8
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A991C171605606EFD718DF24C885FBAF7A9FF44320F008629FA99D2190DB70EA45DBA1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00F34994
                                                                                                                                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 00F349DA
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F349EB
                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,00000000), ref: 00F349F7
                                                                                                                                                                                                  • _wcsstr.LIBVCRUNTIME ref: 00F34A2C
                                                                                                                                                                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00F34A64
                                                                                                                                                                                                  • GetWindowTextW.USER32(?,?,00000400), ref: 00F34A9D
                                                                                                                                                                                                  • GetClassNameW.USER32(00000018,?,00000400), ref: 00F34AE6
                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000400), ref: 00F34B20
                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00F34B8B
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                                                                                                                  • String ID: ThumbnailClass
                                                                                                                                                                                                  • API String ID: 1311036022-1241985126
                                                                                                                                                                                                  • Opcode ID: 98d1d1f972952808795c402fb978e4f44dfc6d934234a59b44cb9f733f65d02c
                                                                                                                                                                                                  • Instruction ID: 3daf244ba3fad6506092bef0a2059ad5512a59b44a2b4f31596d5aff6f300d9a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 98d1d1f972952808795c402fb978e4f44dfc6d934234a59b44cb9f733f65d02c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E691BE325082099FDB04CF14C981BAAB7E8FF84374F04846AFD859A196DB74FD45EBA1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(00FA1990,000000FF,00000000,00000030), ref: 00F3BFAC
                                                                                                                                                                                                  • SetMenuItemInfoW.USER32(00FA1990,00000004,00000000,00000030), ref: 00F3BFE1
                                                                                                                                                                                                  • Sleep.KERNEL32(000001F4), ref: 00F3BFF3
                                                                                                                                                                                                  • GetMenuItemCount.USER32(?), ref: 00F3C039
                                                                                                                                                                                                  • GetMenuItemID.USER32(?,00000000), ref: 00F3C056
                                                                                                                                                                                                  • GetMenuItemID.USER32(?,-00000001), ref: 00F3C082
                                                                                                                                                                                                  • GetMenuItemID.USER32(?,?), ref: 00F3C0C9
                                                                                                                                                                                                  • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00F3C10F
                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F3C124
                                                                                                                                                                                                  • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F3C145
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                  • API String ID: 1460738036-4108050209
                                                                                                                                                                                                  • Opcode ID: 27f80c61655c3759e1e6975a1de6fe3b0e28fb42636c3f20b2e7651d00c8eeb3
                                                                                                                                                                                                  • Instruction ID: 7b48e475634a651aef54a5b409920e6fbf8d0c14d67205c8e177f02dd8dace01
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 27f80c61655c3759e1e6975a1de6fe3b0e28fb42636c3f20b2e7651d00c8eeb3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 20619DB190028AEFDF15DF64CD88ABEBBB8EB05364F044115E991B3291C775AD04EBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00F5CC64
                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00F5CC8D
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00F5CD48
                                                                                                                                                                                                    • Part of subcall function 00F5CC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00F5CCAA
                                                                                                                                                                                                    • Part of subcall function 00F5CC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00F5CCBD
                                                                                                                                                                                                    • Part of subcall function 00F5CC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00F5CCCF
                                                                                                                                                                                                    • Part of subcall function 00F5CC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00F5CD05
                                                                                                                                                                                                    • Part of subcall function 00F5CC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00F5CD28
                                                                                                                                                                                                  • RegDeleteKeyW.ADVAPI32(?,?), ref: 00F5CCF3
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                                                                                                                  • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                  • API String ID: 2734957052-4033151799
                                                                                                                                                                                                  • Opcode ID: ce10619d0170f7393e3339c8aa27c65d4079f2ca99d77fcb157de7a8fd18a1c4
                                                                                                                                                                                                  • Instruction ID: 7ff30c0524f7fee41c70c12529ebfcea2ff52f9f965101662a4ac6cca0ef6ed0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ce10619d0170f7393e3339c8aa27c65d4079f2ca99d77fcb157de7a8fd18a1c4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AB318071D0122CBFDB219B90DC88EFFBB7CEF05751F000165EA56E2141D6B49A49BAE0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00F43D40
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F43D6D
                                                                                                                                                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F43D9D
                                                                                                                                                                                                  • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00F43DBE
                                                                                                                                                                                                  • RemoveDirectoryW.KERNEL32(?), ref: 00F43DCE
                                                                                                                                                                                                  • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00F43E55
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F43E60
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F43E6B
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                                                                                                                  • String ID: :$\$\??\%s
                                                                                                                                                                                                  • API String ID: 1149970189-3457252023
                                                                                                                                                                                                  • Opcode ID: c220bdc7a2f816d982e05bd9b0987d6d386b4771d97414da861fb4e26ff80093
                                                                                                                                                                                                  • Instruction ID: 64bedcdeeaa3e7a689209b741a1476016f8c1c2057d99e1459c9a655665a97d8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c220bdc7a2f816d982e05bd9b0987d6d386b4771d97414da861fb4e26ff80093
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2631A17290020DABDB209BA0DC49FEF3BBCEF89710F1041A5FA55E6160E7B497449B64
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • timeGetTime.WINMM ref: 00F3E6B4
                                                                                                                                                                                                    • Part of subcall function 00EEE551: timeGetTime.WINMM(?,?,00F3E6D4), ref: 00EEE555
                                                                                                                                                                                                  • Sleep.KERNEL32(0000000A), ref: 00F3E6E1
                                                                                                                                                                                                  • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00F3E705
                                                                                                                                                                                                  • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00F3E727
                                                                                                                                                                                                  • SetActiveWindow.USER32 ref: 00F3E746
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00F3E754
                                                                                                                                                                                                  • SendMessageW.USER32(00000010,00000000,00000000), ref: 00F3E773
                                                                                                                                                                                                  • Sleep.KERNEL32(000000FA), ref: 00F3E77E
                                                                                                                                                                                                  • IsWindow.USER32 ref: 00F3E78A
                                                                                                                                                                                                  • EndDialog.USER32(00000000), ref: 00F3E79B
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                                                                                                  • String ID: BUTTON
                                                                                                                                                                                                  • API String ID: 1194449130-3405671355
                                                                                                                                                                                                  • Opcode ID: 9021e6f6829c1721c9449b33d6bcf78cb23845dbb59ed6d9249de1e19e660ed3
                                                                                                                                                                                                  • Instruction ID: 29e7c7a98f082a8d64e6812c9bfe4cdd3b40b6a14ad525c3450c3cbba36fe39d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9021e6f6829c1721c9449b33d6bcf78cb23845dbb59ed6d9249de1e19e660ed3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A221A1B034020DAFEF005F64EC99A363B69FF56368F000425F4A6826E1DBB1AC00BB64
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                  • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00F3EA5D
                                                                                                                                                                                                  • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00F3EA73
                                                                                                                                                                                                  • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00F3EA84
                                                                                                                                                                                                  • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00F3EA96
                                                                                                                                                                                                  • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00F3EAA7
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: SendString$_wcslen
                                                                                                                                                                                                  • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                                                                                                  • API String ID: 2420728520-1007645807
                                                                                                                                                                                                  • Opcode ID: 957b38f97de2a32242ea58a0241c490f805adfa67cf19961b04c7cdeeab9d0db
                                                                                                                                                                                                  • Instruction ID: 8380a5f31272e90f9991965c772f7eb14d96977418f9fa658cc76bede16034f3
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 957b38f97de2a32242ea58a0241c490f805adfa67cf19961b04c7cdeeab9d0db
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4C117731A5025979EB20A7A2DC4AEFF6ABCEFD1B50F0004267411E21D1DE709D06D5B1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetKeyboardState.USER32(?), ref: 00F3A012
                                                                                                                                                                                                  • SetKeyboardState.USER32(?), ref: 00F3A07D
                                                                                                                                                                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00F3A09D
                                                                                                                                                                                                  • GetKeyState.USER32(000000A0), ref: 00F3A0B4
                                                                                                                                                                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00F3A0E3
                                                                                                                                                                                                  • GetKeyState.USER32(000000A1), ref: 00F3A0F4
                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000011), ref: 00F3A120
                                                                                                                                                                                                  • GetKeyState.USER32(00000011), ref: 00F3A12E
                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000012), ref: 00F3A157
                                                                                                                                                                                                  • GetKeyState.USER32(00000012), ref: 00F3A165
                                                                                                                                                                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00F3A18E
                                                                                                                                                                                                  • GetKeyState.USER32(0000005B), ref: 00F3A19C
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: State$Async$Keyboard
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 541375521-0
                                                                                                                                                                                                  • Opcode ID: 6619137477c1c2bfff4f985a702edc3e9485f6f36904f5cdd6d1c29751893752
                                                                                                                                                                                                  • Instruction ID: 665e771a5f333d494015e7e81888575002ca2302359705c6d66b1c3619af9f1f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6619137477c1c2bfff4f985a702edc3e9485f6f36904f5cdd6d1c29751893752
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E051DA30E0878829FB35EB7188157EABFF49F123B0F08459DD5C2571C2DA94AA4CDB62
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000001), ref: 00F35CE2
                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00F35CFB
                                                                                                                                                                                                  • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00F35D59
                                                                                                                                                                                                  • GetDlgItem.USER32(?,00000002), ref: 00F35D69
                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00F35D7B
                                                                                                                                                                                                  • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00F35DCF
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00F35DDD
                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00F35DEF
                                                                                                                                                                                                  • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00F35E31
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003EA), ref: 00F35E44
                                                                                                                                                                                                  • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00F35E5A
                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00F35E67
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3096461208-0
                                                                                                                                                                                                  • Opcode ID: 72142b544c2140725a16b494a88fedf975e3216b3521d85aa25deaa650fc07f0
                                                                                                                                                                                                  • Instruction ID: 32675862a2494f680a7a39286180e61d6cb093e187c08e8694eb90f8063ba854
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 72142b544c2140725a16b494a88fedf975e3216b3521d85aa25deaa650fc07f0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1A511FB1F00609AFDF18CF68CD89AAE7BB5EB88711F108129F555E7290D7B09E00DB60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00EE8F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00EE8BE8,?,00000000,?,?,?,?,00EE8BBA,00000000,?), ref: 00EE8FC5
                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 00EE8C81
                                                                                                                                                                                                  • KillTimer.USER32(00000000,?,?,?,?,00EE8BBA,00000000,?), ref: 00EE8D1B
                                                                                                                                                                                                  • DestroyAcceleratorTable.USER32(00000000), ref: 00F26973
                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00EE8BBA,00000000,?), ref: 00F269A1
                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00EE8BBA,00000000,?), ref: 00F269B8
                                                                                                                                                                                                  • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00EE8BBA,00000000), ref: 00F269D4
                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00F269E6
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 641708696-0
                                                                                                                                                                                                  • Opcode ID: 03aa2687ac957ad79c8c9fefb52f3fa2f5743cb5522013c97b891e3588cbef10
                                                                                                                                                                                                  • Instruction ID: 9a4a6a9b7d298f313ecc79d838ee20088498f98ed8dd130f252d7369ec15fac2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 03aa2687ac957ad79c8c9fefb52f3fa2f5743cb5522013c97b891e3588cbef10
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B761EF7050265CDFDB219F16DA48B26B7F1FF06326F20651DE086A7560CB75AC80EF91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00EE9944: GetWindowLongW.USER32(?,000000EB), ref: 00EE9952
                                                                                                                                                                                                  • GetSysColor.USER32(0000000F), ref: 00EE9862
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ColorLongWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 259745315-0
                                                                                                                                                                                                  • Opcode ID: f6629c5ebd4551039d42395cd5c40753f9c134cf1beab1f5af2299e1059472a2
                                                                                                                                                                                                  • Instruction ID: 8f4126348b6487308d4fd5ca64cc50d152525a29a29890a6877284c2c3de060b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f6629c5ebd4551039d42395cd5c40753f9c134cf1beab1f5af2299e1059472a2
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FB41E031100698AFDB245F399C84BB93BA5AB06330F185605F9F2972F2D3719C41EB51
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID: .
                                                                                                                                                                                                  • API String ID: 0-3963672497
                                                                                                                                                                                                  • Opcode ID: c0f35ad261ebefe19991f69f253a248989528190f00f0667f42ce0553fe57774
                                                                                                                                                                                                  • Instruction ID: e7cd8e08e24b364f28129ddec44ab507244b2e3301fd1ebfcb9860bdb16038ad
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c0f35ad261ebefe19991f69f253a248989528190f00f0667f42ce0553fe57774
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E4C1E2B5E08249AFDB11DFA8DC41BADBBB0AF49320F044159F554A73D2DB748942FB60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00F1F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00F39717
                                                                                                                                                                                                  • LoadStringW.USER32(00000000,?,00F1F7F8,00000001), ref: 00F39720
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00F1F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00F39742
                                                                                                                                                                                                  • LoadStringW.USER32(00000000,?,00F1F7F8,00000001), ref: 00F39745
                                                                                                                                                                                                  • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00F39866
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                                                                                                                  • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                                                                                                  • API String ID: 747408836-2268648507
                                                                                                                                                                                                  • Opcode ID: 8f9d82a80d32d79349b2afd92a634e81e78fde75fc1fabc474224383f535c980
                                                                                                                                                                                                  • Instruction ID: 0dae84acc7168d03cbc8a205d919e744213e6318532a44962e5f040dc75801d1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8f9d82a80d32d79349b2afd92a634e81e78fde75fc1fabc474224383f535c980
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0C417272904209AADF04FBE0DE42DEEB3B8EF55740F501026F10172192EB756F49DB61
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                  • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00F307A2
                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00F307BE
                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00F307DA
                                                                                                                                                                                                  • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00F30804
                                                                                                                                                                                                  • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00F3082C
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F30837
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00F3083C
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                                                                                                                  • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                                                                                                  • API String ID: 323675364-22481851
                                                                                                                                                                                                  • Opcode ID: db4e2928eceb245e703f7d4c7633f987fc860ed84419db75cedbca717d8d4899
                                                                                                                                                                                                  • Instruction ID: c2ffd57526a2427f240fc5bda567b8e5b281166c0e9af154e3bd397d73669108
                                                                                                                                                                                                  • Opcode Fuzzy Hash: db4e2928eceb245e703f7d4c7633f987fc860ed84419db75cedbca717d8d4899
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E6412676C0022DABDF15EBA4DC958EDB7B8FF04750F04412AE951B72A1EB709E05DBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00F6403B
                                                                                                                                                                                                  • CreateCompatibleDC.GDI32(00000000), ref: 00F64042
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00F64055
                                                                                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00F6405D
                                                                                                                                                                                                  • GetPixel.GDI32(00000000,00000000,00000000), ref: 00F64068
                                                                                                                                                                                                  • DeleteDC.GDI32(00000000), ref: 00F64072
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 00F6407C
                                                                                                                                                                                                  • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00F64092
                                                                                                                                                                                                  • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00F6409E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                                                                                                                  • String ID: static
                                                                                                                                                                                                  • API String ID: 2559357485-2160076837
                                                                                                                                                                                                  • Opcode ID: 858e873539f09cc59d5b15c76a20c0fa8289cc52e3a1dfed7a981a1f1fa983b8
                                                                                                                                                                                                  • Instruction ID: d0d96cc6837cfcbce609b1a9c93ee6d8bb080bafb00072f57ea2214d491b1f31
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 858e873539f09cc59d5b15c76a20c0fa8289cc52e3a1dfed7a981a1f1fa983b8
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3B316132501219BBDF219FA4CC05FEA3B69FF0D360F110215FAA9E61A1C775D851EBA4
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00F53C5C
                                                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 00F53C8A
                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 00F53C94
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F53D2D
                                                                                                                                                                                                  • GetRunningObjectTable.OLE32(00000000,?), ref: 00F53DB1
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001,00000029), ref: 00F53ED5
                                                                                                                                                                                                  • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00F53F0E
                                                                                                                                                                                                  • CoGetObject.OLE32(?,00000000,00F6FB98,?), ref: 00F53F2D
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000), ref: 00F53F40
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00F53FC4
                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00F53FD8
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 429561992-0
                                                                                                                                                                                                  • Opcode ID: 1fb61a956d0ca4bcaea9c328a74695a3c83502959aa8d4d91c413f3344a0d84d
                                                                                                                                                                                                  • Instruction ID: 114f58afb4fc0bfeca98d7a2c47e598502c6366b468decd9638541383b463e86
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1fb61a956d0ca4bcaea9c328a74695a3c83502959aa8d4d91c413f3344a0d84d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CAC136716082059FC700DF68C88492BB7F9FF89795F00491DFA899B251DB71EE09DB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 00F47AF3
                                                                                                                                                                                                  • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00F47B8F
                                                                                                                                                                                                  • SHGetDesktopFolder.SHELL32(?), ref: 00F47BA3
                                                                                                                                                                                                  • CoCreateInstance.OLE32(00F6FD08,00000000,00000001,00F96E6C,?), ref: 00F47BEF
                                                                                                                                                                                                  • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00F47C74
                                                                                                                                                                                                  • CoTaskMemFree.OLE32(?,?), ref: 00F47CCC
                                                                                                                                                                                                  • SHBrowseForFolderW.SHELL32(?), ref: 00F47D57
                                                                                                                                                                                                  • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00F47D7A
                                                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00F47D81
                                                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000), ref: 00F47DD6
                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 00F47DDC
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2762341140-0
                                                                                                                                                                                                  • Opcode ID: f2e45497b9429ea34ce65531e6a9de658073eca751c4b8527349c30b3f1b5251
                                                                                                                                                                                                  • Instruction ID: 1b726b75ec19f8071e8f34ff4b796efb967283cfbbef957801d15212787a6683
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f2e45497b9429ea34ce65531e6a9de658073eca751c4b8527349c30b3f1b5251
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BAC14C75A04209AFCB14DFA4C884DAEBBF9FF48314B148499E859EB361D730ED41DB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00F65504
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F65515
                                                                                                                                                                                                  • CharNextW.USER32(00000158), ref: 00F65544
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00F65585
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00F6559B
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F655AC
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$CharNext
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1350042424-0
                                                                                                                                                                                                  • Opcode ID: a6da4af2a7f02c0fe65cb79cc7a3f2c3e83b851e4d2ff1b2897f44366c41f919
                                                                                                                                                                                                  • Instruction ID: 1f458816524028b63d9eff41fd1316efca6882ccb948cbe0c21f132c0eb58650
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a6da4af2a7f02c0fe65cb79cc7a3f2c3e83b851e4d2ff1b2897f44366c41f919
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 69619D71900609ABDF10DF64CC84AFE7BB9EB09B34F144145F965BA291DB758A80EB60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00F2FAAF
                                                                                                                                                                                                  • SafeArrayAllocData.OLEAUT32(?), ref: 00F2FB08
                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00F2FB1A
                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(?,?), ref: 00F2FB3A
                                                                                                                                                                                                  • VariantCopy.OLEAUT32(?,?), ref: 00F2FB8D
                                                                                                                                                                                                  • SafeArrayUnaccessData.OLEAUT32(?), ref: 00F2FBA1
                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00F2FBB6
                                                                                                                                                                                                  • SafeArrayDestroyData.OLEAUT32(?), ref: 00F2FBC3
                                                                                                                                                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F2FBCC
                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00F2FBDE
                                                                                                                                                                                                  • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00F2FBE9
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2706829360-0
                                                                                                                                                                                                  • Opcode ID: 34e4f19fe0f8d8cda6360540d702622b35957d4405d3968b08734399a7f02e35
                                                                                                                                                                                                  • Instruction ID: b52375f5a68a65eaaf2443bc8c4a3765c1d68344958be0d8bf6fb81f0877678a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 34e4f19fe0f8d8cda6360540d702622b35957d4405d3968b08734399a7f02e35
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 29413E35A1021A9FCB00DF64DC589AEBBB9EF48354F008079E996A7261CB74A945DFA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetKeyboardState.USER32(?), ref: 00F39CA1
                                                                                                                                                                                                  • GetAsyncKeyState.USER32(000000A0), ref: 00F39D22
                                                                                                                                                                                                  • GetKeyState.USER32(000000A0), ref: 00F39D3D
                                                                                                                                                                                                  • GetAsyncKeyState.USER32(000000A1), ref: 00F39D57
                                                                                                                                                                                                  • GetKeyState.USER32(000000A1), ref: 00F39D6C
                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000011), ref: 00F39D84
                                                                                                                                                                                                  • GetKeyState.USER32(00000011), ref: 00F39D96
                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000012), ref: 00F39DAE
                                                                                                                                                                                                  • GetKeyState.USER32(00000012), ref: 00F39DC0
                                                                                                                                                                                                  • GetAsyncKeyState.USER32(0000005B), ref: 00F39DD8
                                                                                                                                                                                                  • GetKeyState.USER32(0000005B), ref: 00F39DEA
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: State$Async$Keyboard
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 541375521-0
                                                                                                                                                                                                  • Opcode ID: 07cbe357ee7449d703831dacd0069eb3be3a7df602b3fa8c067ecb1f43b2b252
                                                                                                                                                                                                  • Instruction ID: 69d80b6ac807401ee90faf534a599216bfa5816165a5e9f170294913594acf86
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 07cbe357ee7449d703831dacd0069eb3be3a7df602b3fa8c067ecb1f43b2b252
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4C41A734D0C7CA69FF31976488053B6BEA06F11374F08805ADAC6566C2DBE59DC4EBA2
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • WSAStartup.WSOCK32(00000101,?), ref: 00F505BC
                                                                                                                                                                                                  • inet_addr.WSOCK32(?), ref: 00F5061C
                                                                                                                                                                                                  • gethostbyname.WSOCK32(?), ref: 00F50628
                                                                                                                                                                                                  • IcmpCreateFile.IPHLPAPI ref: 00F50636
                                                                                                                                                                                                  • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00F506C6
                                                                                                                                                                                                  • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00F506E5
                                                                                                                                                                                                  • IcmpCloseHandle.IPHLPAPI(?), ref: 00F507B9
                                                                                                                                                                                                  • WSACleanup.WSOCK32 ref: 00F507BF
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                                                                                                  • String ID: Ping
                                                                                                                                                                                                  • API String ID: 1028309954-2246546115
                                                                                                                                                                                                  • Opcode ID: cb646d986074740f7a40c9529f754f49d2dd1d87326d88e35f3b779985266b61
                                                                                                                                                                                                  • Instruction ID: 8eed404ce0d2b5e816890d54f5a461674dac9e74197f431279a776afd81b7dcb
                                                                                                                                                                                                  • Opcode Fuzzy Hash: cb646d986074740f7a40c9529f754f49d2dd1d87326d88e35f3b779985266b61
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0291A075A042019FD320CF15D488F16BBE0EF48328F1485A9F9A99B7A2DB70ED49DF81
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen$BuffCharLower
                                                                                                                                                                                                  • String ID: cdecl$none$stdcall$winapi
                                                                                                                                                                                                  • API String ID: 707087890-567219261
                                                                                                                                                                                                  • Opcode ID: 7764294d0ceea4ce298c21b0c3e8b4a7b03e72c0f8e48e1b1b9fa2415966d1b6
                                                                                                                                                                                                  • Instruction ID: ff8bb82d76873f97cd513c28ad80fcbbd340f32ff4da5045f8a848d430cfa982
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7764294d0ceea4ce298c21b0c3e8b4a7b03e72c0f8e48e1b1b9fa2415966d1b6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5B51C332A001169BCF14DFA8C8415BEB7F1AF643A1B204229EA66F72C1DB31DD46E790
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CoInitialize.OLE32 ref: 00F53774
                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 00F5377F
                                                                                                                                                                                                  • CoCreateInstance.OLE32(?,00000000,00000017,00F6FB78,?), ref: 00F537D9
                                                                                                                                                                                                  • IIDFromString.OLE32(?,?), ref: 00F5384C
                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00F538E4
                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00F53936
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                                                                                                                  • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                                                                                                  • API String ID: 636576611-1287834457
                                                                                                                                                                                                  • Opcode ID: 9517fce51cebcf2e4e419feadf55fd025ae8dc478ed44188215443ea5127d2b0
                                                                                                                                                                                                  • Instruction ID: ed8e89decbf0f02d20df056352c36777665ed3cb86787042be9d6bee3b767862
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9517fce51cebcf2e4e419feadf55fd025ae8dc478ed44188215443ea5127d2b0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7861B371608301AFD311DF68D849F6ABBE4EF48756F100909FA859B291D770EE48EB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00F433CF
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                  • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00F433F0
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: LoadString$_wcslen
                                                                                                                                                                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                  • API String ID: 4099089115-3080491070
                                                                                                                                                                                                  • Opcode ID: 10e5ea18ab768b20a1370df41ec4dabbea64f59cfdc96eae8f2216611271ddcf
                                                                                                                                                                                                  • Instruction ID: ff0e1183209b57a226a3a1d14daf2155a668b27974ee9987c88f0e9a37d06fcb
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 10e5ea18ab768b20a1370df41ec4dabbea64f59cfdc96eae8f2216611271ddcf
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8251B172D00209AADF14EBE0DD42EEEB7B8EF14340F144066F405721A2EB756F59EB61
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                  • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                                                                                                                                  • API String ID: 1256254125-769500911
                                                                                                                                                                                                  • Opcode ID: 316f193f17759bd7afb1ab74a47e6841fe7abc5a59a586b77ddec909d1e21271
                                                                                                                                                                                                  • Instruction ID: 840894c791ce88323bcd29b35966bd204f878e0b37e5084d3a66215db7b6a6e2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 316f193f17759bd7afb1ab74a47e6841fe7abc5a59a586b77ddec909d1e21271
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E841E832E0002B9BCB105F7DC8A15BE77A5EFA0774F244169E625DB286E731CD81E790
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00F453A0
                                                                                                                                                                                                  • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00F45416
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00F45420
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,READY), ref: 00F454A7
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                                                                                                                  • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                                                                                                                  • API String ID: 4194297153-14809454
                                                                                                                                                                                                  • Opcode ID: b18aa1f29d74896505efd5723522d88b92c023c6c4bbf9ad30068e992edd49dc
                                                                                                                                                                                                  • Instruction ID: b719162c5d40e89d333d7ce1d586cd3c4e7e8d0b9d17692870b521e2dd48ffa1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b18aa1f29d74896505efd5723522d88b92c023c6c4bbf9ad30068e992edd49dc
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4231C035A001089FDB10EF68C894BAABBB4EF05715F148066E805DF3A3DB75DD82EB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateMenu.USER32 ref: 00F63C79
                                                                                                                                                                                                  • SetMenu.USER32(?,00000000), ref: 00F63C88
                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F63D10
                                                                                                                                                                                                  • IsMenu.USER32(?), ref: 00F63D24
                                                                                                                                                                                                  • CreatePopupMenu.USER32 ref: 00F63D2E
                                                                                                                                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F63D5B
                                                                                                                                                                                                  • DrawMenuBar.USER32 ref: 00F63D63
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                                                                                                                  • String ID: 0$F
                                                                                                                                                                                                  • API String ID: 161812096-3044882817
                                                                                                                                                                                                  • Opcode ID: 3e473dcd530080b8e5ff351fc761225ebbd5db22d55c1e87fb0e4c96223a0bc5
                                                                                                                                                                                                  • Instruction ID: d06974b1c669787d720c46374e6a086fba88734b90c71e2ac9fa38bb578b4dd0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3e473dcd530080b8e5ff351fc761225ebbd5db22d55c1e87fb0e4c96223a0bc5
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7F415979A01209AFDB14CF64DC44AAA7BB5FF49350F180029FA96A7360D770AE10EF94
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                    • Part of subcall function 00F33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F33CCA
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00F31F64
                                                                                                                                                                                                  • GetDlgCtrlID.USER32 ref: 00F31F6F
                                                                                                                                                                                                  • GetParent.USER32 ref: 00F31F8B
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F31F8E
                                                                                                                                                                                                  • GetDlgCtrlID.USER32(?), ref: 00F31F97
                                                                                                                                                                                                  • GetParent.USER32(?), ref: 00F31FAB
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F31FAE
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                  • API String ID: 711023334-1403004172
                                                                                                                                                                                                  • Opcode ID: 10c1a19115df4b5ef701bab0ea087f564cd480f0b032e4808eabba1a4e96db2c
                                                                                                                                                                                                  • Instruction ID: d48722d6d471d44ef1a6b7993467efc19aaa9ed1cfe1f0ec409d6a31dfeefab9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 10c1a19115df4b5ef701bab0ea087f564cd480f0b032e4808eabba1a4e96db2c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6521F574D00118BBCF04AFA0DC44DFEBBB4EF05360F105106F9A567292CB794905EB60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                    • Part of subcall function 00F33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F33CCA
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00F32043
                                                                                                                                                                                                  • GetDlgCtrlID.USER32 ref: 00F3204E
                                                                                                                                                                                                  • GetParent.USER32 ref: 00F3206A
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F3206D
                                                                                                                                                                                                  • GetDlgCtrlID.USER32(?), ref: 00F32076
                                                                                                                                                                                                  • GetParent.USER32(?), ref: 00F3208A
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,00000111,?), ref: 00F3208D
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                  • API String ID: 711023334-1403004172
                                                                                                                                                                                                  • Opcode ID: 9ed6d1eb9c10bbde09879cd09b3dfe8b8e8b0162fe1ea44d546caa0b355d3551
                                                                                                                                                                                                  • Instruction ID: f9357cd3a26dc938682192c3d1acbcc099f2b719e109d27f06e99fe07164dbe6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9ed6d1eb9c10bbde09879cd09b3dfe8b8e8b0162fe1ea44d546caa0b355d3551
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D921F9B5D00218BBDF15AFA0DC45EFEBBB8EF05350F104006F9A5672A2C6794919EB60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00F63A9D
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00F63AA0
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00F63AC7
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00F63AEA
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00F63B62
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00F63BAC
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00F63BC7
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00F63BE2
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00F63BF6
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00F63C13
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$LongWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 312131281-0
                                                                                                                                                                                                  • Opcode ID: c72b2397505c7338cc3405c0b2ade8195c83f6a8f90389b2cecfd0921ae6f05e
                                                                                                                                                                                                  • Instruction ID: 36155585d4b4421f99113823e4892386c1267ab812adda6c757d09381599b214
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c72b2397505c7338cc3405c0b2ade8195c83f6a8f90389b2cecfd0921ae6f05e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FA617975A00208AFDB10DFA8CC81EEE77F8EF49714F10419AFA15A72A1D774AE45EB50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00F3B151
                                                                                                                                                                                                  • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00F3A1E1,?,00000001), ref: 00F3B165
                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(00000000), ref: 00F3B16C
                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F3A1E1,?,00000001), ref: 00F3B17B
                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F3B18D
                                                                                                                                                                                                  • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00F3A1E1,?,00000001), ref: 00F3B1A6
                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00F3A1E1,?,00000001), ref: 00F3B1B8
                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00F3A1E1,?,00000001), ref: 00F3B1FD
                                                                                                                                                                                                  • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00F3A1E1,?,00000001), ref: 00F3B212
                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00F3A1E1,?,00000001), ref: 00F3B21D
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2156557900-0
                                                                                                                                                                                                  • Opcode ID: f658789497bb81e90e4a2f3239d9da554954db0e18c75453b02ad2be838128a0
                                                                                                                                                                                                  • Instruction ID: a73a8c1ee7dfaa2a5f946ed6b3039a443103c72c2889627c353ae4e9c4a4c0ce
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f658789497bb81e90e4a2f3239d9da554954db0e18c75453b02ad2be838128a0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0131DDB1900208BFDB11AF24DC69B7EBBA9BB52335F108104FB56D6190D7B4DE00AFA4
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02C94
                                                                                                                                                                                                    • Part of subcall function 00F029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000), ref: 00F029DE
                                                                                                                                                                                                    • Part of subcall function 00F029C8: GetLastError.KERNEL32(00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000,00000000), ref: 00F029F0
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02CA0
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02CAB
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02CB6
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02CC1
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02CCC
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02CD7
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02CE2
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02CED
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02CFB
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 776569668-0
                                                                                                                                                                                                  • Opcode ID: 7b963a7174df728a00530f8254313c95f570bffdba351a67ef9a23d2a7edbeef
                                                                                                                                                                                                  • Instruction ID: a9c2183d17f87dc0f74180855e0818dddac56a124564722a973171ce63d7a928
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7b963a7174df728a00530f8254313c95f570bffdba351a67ef9a23d2a7edbeef
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9F119676500108AFCB42EF58DC46CDD3BB9FF05350F9144A5F9485B262D635EA50BBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00F47FAD
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F47FC1
                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(?), ref: 00F47FEB
                                                                                                                                                                                                  • SetFileAttributesW.KERNEL32(?,00000000), ref: 00F48005
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F48017
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?), ref: 00F48060
                                                                                                                                                                                                  • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00F480B0
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CurrentDirectory$AttributesFile
                                                                                                                                                                                                  • String ID: *.*
                                                                                                                                                                                                  • API String ID: 769691225-438819550
                                                                                                                                                                                                  • Opcode ID: c4e5f3234ee3eb72ed5c723074c026eb87d9e6b54f99eed595261e00f8e80d10
                                                                                                                                                                                                  • Instruction ID: d653f0cc30186eebefe1bff6a67abca3121028b7e956f62d5424322bd12644dc
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c4e5f3234ee3eb72ed5c723074c026eb87d9e6b54f99eed595261e00f8e80d10
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1481A0729083459BCB20EF14C844AAEBBE8FF84360F14495AFC85D7250EB75DD49AB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000EB), ref: 00ED5C7A
                                                                                                                                                                                                    • Part of subcall function 00ED5D0A: GetClientRect.USER32(?,?), ref: 00ED5D30
                                                                                                                                                                                                    • Part of subcall function 00ED5D0A: GetWindowRect.USER32(?,?), ref: 00ED5D71
                                                                                                                                                                                                    • Part of subcall function 00ED5D0A: ScreenToClient.USER32(?,?), ref: 00ED5D99
                                                                                                                                                                                                  • GetDC.USER32 ref: 00F146F5
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00F14708
                                                                                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00F14716
                                                                                                                                                                                                  • SelectObject.GDI32(00000000,00000000), ref: 00F1472B
                                                                                                                                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00F14733
                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00F147C4
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                                                                                                  • String ID: U
                                                                                                                                                                                                  • API String ID: 4009187628-3372436214
                                                                                                                                                                                                  • Opcode ID: 7c16cb0ba8f229dd787b6a8cd854fae3d5f14969d01fe55ee8df92253a0f4882
                                                                                                                                                                                                  • Instruction ID: f2bddefa2391e27d76852036c8e92ab1b3fb97d38c6d7b3225c3ed751c860ddc
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7c16cb0ba8f229dd787b6a8cd854fae3d5f14969d01fe55ee8df92253a0f4882
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0571A731900209DFCF218F64C984AFA7BB5FF86365F14426AED556A2A5C731AC81EF50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00F435E4
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                  • LoadStringW.USER32(00FA2390,?,00000FFF,?), ref: 00F4360A
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: LoadString$_wcslen
                                                                                                                                                                                                  • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                  • API String ID: 4099089115-2391861430
                                                                                                                                                                                                  • Opcode ID: 18d003102f83da9b0e3d58bcd915cceefe93d844f9bde4a423e8b1a95d366d28
                                                                                                                                                                                                  • Instruction ID: 70193211ba5f8471677e8855713c476373ecb68524cdb4964056c5b58d4a79e8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 18d003102f83da9b0e3d58bcd915cceefe93d844f9bde4a423e8b1a95d366d28
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5F519271D00209BADF14EBA0DC42EEDBB78EF04310F145126F515722A2DB755B99EFA1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F4C272
                                                                                                                                                                                                  • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00F4C29A
                                                                                                                                                                                                  • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00F4C2CA
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00F4C322
                                                                                                                                                                                                  • SetEvent.KERNEL32(?), ref: 00F4C336
                                                                                                                                                                                                  • InternetCloseHandle.WININET(00000000), ref: 00F4C341
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3113390036-3916222277
                                                                                                                                                                                                  • Opcode ID: ce1297f74c37a5bce44d03322e4826634dbbbcd63fa746b5c2d5a4e2a1356c08
                                                                                                                                                                                                  • Instruction ID: 1ee118e3daea5115b564534c6dbaf7aea575b994cfc1a5e1b053f232fba7273a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ce1297f74c37a5bce44d03322e4826634dbbbcd63fa746b5c2d5a4e2a1356c08
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D7317FB1601208AFD7619FA48C88ABB7FFCEB49754B14951EF886D3210DB74DD44ABE0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00F13AAF,?,?,Bad directive syntax error,00F6CC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00F398BC
                                                                                                                                                                                                  • LoadStringW.USER32(00000000,?,00F13AAF,?), ref: 00F398C3
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                  • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00F39987
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                                                                                                                  • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                                                                                                  • API String ID: 858772685-4153970271
                                                                                                                                                                                                  • Opcode ID: fb6970b90db702ba17136d1626e7220a32244df3d784d2f447bb252bd6ffbd50
                                                                                                                                                                                                  • Instruction ID: 4cad1357ceefce770b78f58e0bf15b5f1af785d7ca21441658a88b97e841a01e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: fb6970b90db702ba17136d1626e7220a32244df3d784d2f447bb252bd6ffbd50
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9A219E3290420EABDF15AF90CC06EEE77B5FF18700F04542AF515761A2EBB19A28EB51
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetParent.USER32 ref: 00F320AB
                                                                                                                                                                                                  • GetClassNameW.USER32(00000000,?,00000100), ref: 00F320C0
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00F3214D
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ClassMessageNameParentSend
                                                                                                                                                                                                  • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                                                                                                  • API String ID: 1290815626-3381328864
                                                                                                                                                                                                  • Opcode ID: 3fd4b87fb01e25fe9a9976fa3b2f7f666479c645f35d1772b30521c0f47204fd
                                                                                                                                                                                                  • Instruction ID: f9084cdd21516d52816ed44393c8935364dc5292fbed9965d7b27516ed40c2ad
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3fd4b87fb01e25fe9a9976fa3b2f7f666479c645f35d1772b30521c0f47204fd
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 531106B7A8870AB9FA023620DC06DB7379CCB04734F201156FB04B50E2FAA2A9027658
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1282221369-0
                                                                                                                                                                                                  • Opcode ID: 4d5652b9d8146ff4d1edfc92fbd24be33afb78ab6e388a1427a7996d77a728ca
                                                                                                                                                                                                  • Instruction ID: 789c730c585f21d165426fb02adcd4d6fc3b54b69629c04c4a48f8fc26ef18ac
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4d5652b9d8146ff4d1edfc92fbd24be33afb78ab6e388a1427a7996d77a728ca
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2E6159B2D04306AFDB21AFB49C85A6D7BA5AF01320F14426DF945A72C1DB35AD01B7F1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00F65186
                                                                                                                                                                                                  • ShowWindow.USER32(?,00000000), ref: 00F651C7
                                                                                                                                                                                                  • ShowWindow.USER32(?,00000005,?,00000000), ref: 00F651CD
                                                                                                                                                                                                  • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00F651D1
                                                                                                                                                                                                    • Part of subcall function 00F66FBA: DeleteObject.GDI32(00000000), ref: 00F66FE6
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00F6520D
                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F6521A
                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00F6524D
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00F65287
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00F65296
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3210457359-0
                                                                                                                                                                                                  • Opcode ID: 30a827e35695d48d8184f5fe1932ca59a01ed03738c7cd0300c60c0f293b0f40
                                                                                                                                                                                                  • Instruction ID: 01347613d49fe4c125af881d52b4f1b8e40c0b51364d2957ae928c2caca54828
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 30a827e35695d48d8184f5fe1932ca59a01ed03738c7cd0300c60c0f293b0f40
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4051E470E40A08BFEF209F64CC55BD93BA5FB06B24F144012F665B62E1C3B5A990FB50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00F26890
                                                                                                                                                                                                  • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00F268A9
                                                                                                                                                                                                  • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00F268B9
                                                                                                                                                                                                  • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00F268D1
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00F268F2
                                                                                                                                                                                                  • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00EE8874,00000000,00000000,00000000,000000FF,00000000), ref: 00F26901
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00F2691E
                                                                                                                                                                                                  • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00EE8874,00000000,00000000,00000000,000000FF,00000000), ref: 00F2692D
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1268354404-0
                                                                                                                                                                                                  • Opcode ID: d755087c04e42a7231a99707793710ad443c40c84fd727965cd9c824d18b03f7
                                                                                                                                                                                                  • Instruction ID: a2863b1fc9711eeb61a359c7c6840148b16fe212b4335730e2e4763b0f260642
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d755087c04e42a7231a99707793710ad443c40c84fd727965cd9c824d18b03f7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5E517CB4A00209AFDB20CF25DC55BAA77B5FF48760F104518F956E72A0DBB1E990EB50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00F4C182
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00F4C195
                                                                                                                                                                                                  • SetEvent.KERNEL32(?), ref: 00F4C1A9
                                                                                                                                                                                                    • Part of subcall function 00F4C253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00F4C272
                                                                                                                                                                                                    • Part of subcall function 00F4C253: GetLastError.KERNEL32 ref: 00F4C322
                                                                                                                                                                                                    • Part of subcall function 00F4C253: SetEvent.KERNEL32(?), ref: 00F4C336
                                                                                                                                                                                                    • Part of subcall function 00F4C253: InternetCloseHandle.WININET(00000000), ref: 00F4C341
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 337547030-0
                                                                                                                                                                                                  • Opcode ID: b4cb20eaf60ecbeccc917942f49608e5e27b138d348d76bc2e49ff71e9fa0722
                                                                                                                                                                                                  • Instruction ID: ebebb2b7ab036f532a0fef947c15a2fa787f1bb6d395e496093bb9d57c5f619f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b4cb20eaf60ecbeccc917942f49608e5e27b138d348d76bc2e49ff71e9fa0722
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DB31BC71602605AFDB608FA4DC04A76BFE8FF58310B00552DFD9A82220D7B1E910BBE0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F33A57
                                                                                                                                                                                                    • Part of subcall function 00F33A3D: GetCurrentThreadId.KERNEL32 ref: 00F33A5E
                                                                                                                                                                                                    • Part of subcall function 00F33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F325B3), ref: 00F33A65
                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F325BD
                                                                                                                                                                                                  • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00F325DB
                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00F325DF
                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F325E9
                                                                                                                                                                                                  • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00F32601
                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00F32605
                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000025,00000000), ref: 00F3260F
                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00F32623
                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00F32627
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2014098862-0
                                                                                                                                                                                                  • Opcode ID: 037c73374984fec4e04f19fb3aa33dc3a3a0363b0bc74792fd3bd6759a4864fa
                                                                                                                                                                                                  • Instruction ID: cef5c273ac0052ee6b0f75754c539b404273a0fcfab272e3287ee04709c442b5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 037c73374984fec4e04f19fb3aa33dc3a3a0363b0bc74792fd3bd6759a4864fa
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B401D831390214BBFB107769DC8AF693F59DF4EB21F100001F3A8AE0D2C9F22444AAA9
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00F31449,?,?,00000000), ref: 00F3180C
                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000,?,00F31449,?,?,00000000), ref: 00F31813
                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00F31449,?,?,00000000), ref: 00F31828
                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(?,00000000,?,00F31449,?,?,00000000), ref: 00F31830
                                                                                                                                                                                                  • DuplicateHandle.KERNEL32(00000000,?,00F31449,?,?,00000000), ref: 00F31833
                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00F31449,?,?,00000000), ref: 00F31843
                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00F31449,00000000,?,00F31449,?,?,00000000), ref: 00F3184B
                                                                                                                                                                                                  • DuplicateHandle.KERNEL32(00000000,?,00F31449,?,?,00000000), ref: 00F3184E
                                                                                                                                                                                                  • CreateThread.KERNEL32(00000000,00000000,00F31874,00000000,00000000,00000000), ref: 00F31868
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1957940570-0
                                                                                                                                                                                                  • Opcode ID: d467ad13d4c28004b883ea5acc35e1b5ee26efb3b0dc3203447a29b48389c5f0
                                                                                                                                                                                                  • Instruction ID: a4db7853dba07473c3229e3c3f78c4782d246211a6fa0819ac142338ce9e052d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d467ad13d4c28004b883ea5acc35e1b5ee26efb3b0dc3203447a29b48389c5f0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D901BF75240348BFE710AB65DC4DF6B3B6CEB8AB11F004411FA95DB192C6B19800EB70
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: __alldvrm$_strrchr
                                                                                                                                                                                                  • String ID: }}$}}$}}
                                                                                                                                                                                                  • API String ID: 1036877536-1495402609
                                                                                                                                                                                                  • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                  • Instruction ID: a73a06a7f52ce982819102faf9bd60b83de2f2853abc14e1e7b925082fa031d9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AFA149B2E043869FDB16CF18CC917AEBBE5EF61360F14416DE6959B2C1C238A981F750
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F3D4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00F3D501
                                                                                                                                                                                                    • Part of subcall function 00F3D4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00F3D50F
                                                                                                                                                                                                    • Part of subcall function 00F3D4DC: CloseHandle.KERNELBASE(00000000), ref: 00F3D5DC
                                                                                                                                                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F5A16D
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00F5A180
                                                                                                                                                                                                  • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00F5A1B3
                                                                                                                                                                                                  • TerminateProcess.KERNEL32(00000000,00000000), ref: 00F5A268
                                                                                                                                                                                                  • GetLastError.KERNEL32(00000000), ref: 00F5A273
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F5A2C4
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                                                                                                  • String ID: SeDebugPrivilege
                                                                                                                                                                                                  • API String ID: 2533919879-2896544425
                                                                                                                                                                                                  • Opcode ID: f91fc2432f87e65f2b2b7795d9600e74204b9543aff0cd1aade9a3573044ec6e
                                                                                                                                                                                                  • Instruction ID: ac5220f566202db8ddb8f510870cddf676ea554ac356395dee0a899990388225
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f91fc2432f87e65f2b2b7795d9600e74204b9543aff0cd1aade9a3573044ec6e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4561C3316046429FD710DF18C495F25BBE1EF44328F18858CE9A68B7A3C776EC4ADB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00F63925
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00F6393A
                                                                                                                                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00F63954
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F63999
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001057,00000000,?), ref: 00F639C6
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00F639F4
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$Window_wcslen
                                                                                                                                                                                                  • String ID: SysListView32
                                                                                                                                                                                                  • API String ID: 2147712094-78025650
                                                                                                                                                                                                  • Opcode ID: aa7e9c9bfa7c30c5e2c991c209f558a37aa64925f49d44525a26b6af5d6b4c5d
                                                                                                                                                                                                  • Instruction ID: 08d84e7964e5ef6d42dbb1733a54680e179404dfcfb8d846ff7c363560e59749
                                                                                                                                                                                                  • Opcode Fuzzy Hash: aa7e9c9bfa7c30c5e2c991c209f558a37aa64925f49d44525a26b6af5d6b4c5d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4A418271E00319ABEF219F64CC45FEA77A9EF08364F100526F958E7281D7B59980EB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F3BCFD
                                                                                                                                                                                                  • IsMenu.USER32(00000000), ref: 00F3BD1D
                                                                                                                                                                                                  • CreatePopupMenu.USER32 ref: 00F3BD53
                                                                                                                                                                                                  • GetMenuItemCount.USER32(015C61C0), ref: 00F3BDA4
                                                                                                                                                                                                  • InsertMenuItemW.USER32(015C61C0,?,00000001,00000030), ref: 00F3BDCC
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                                                                                                                  • String ID: 0$2
                                                                                                                                                                                                  • API String ID: 93392585-3793063076
                                                                                                                                                                                                  • Opcode ID: 21a6c625072e771e982a2af6944aee7ba148ab03ad7b41e8de4e8512eafca6d7
                                                                                                                                                                                                  • Instruction ID: 99e2abb871c77921446f4538435622174179bf9ccdf35a9417d5a8b46b0e4a41
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 21a6c625072e771e982a2af6944aee7ba148ab03ad7b41e8de4e8512eafca6d7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7A51BF70A002099BDF20DFA8DCA8BAEBBF4BF45334F144219E651E7291D7709941EB61
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00EF2D4B
                                                                                                                                                                                                  • ___except_validate_context_record.LIBVCRUNTIME ref: 00EF2D53
                                                                                                                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00EF2DE1
                                                                                                                                                                                                  • __IsNonwritableInCurrentImage.LIBCMT ref: 00EF2E0C
                                                                                                                                                                                                  • _ValidateLocalCookies.LIBCMT ref: 00EF2E61
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                                                                                  • String ID: &H$csm
                                                                                                                                                                                                  • API String ID: 1170836740-1242228090
                                                                                                                                                                                                  • Opcode ID: 3067d1d9329089a2f252cfd824a94c0a2d729d901cad5685071f553f0150ba0d
                                                                                                                                                                                                  • Instruction ID: 8fb9091a01122898b411935e6baf77774a362a754c7a69f0aae1f6facda06bcf
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3067d1d9329089a2f252cfd824a94c0a2d729d901cad5685071f553f0150ba0d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9641A234A0020DABCF14DF68C845AAEBBB5BF45328F149159EB14BB392D7369A01CBD1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • LoadIconW.USER32(00000000,00007F03), ref: 00F3C913
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: IconLoad
                                                                                                                                                                                                  • String ID: blank$info$question$stop$warning
                                                                                                                                                                                                  • API String ID: 2457776203-404129466
                                                                                                                                                                                                  • Opcode ID: d9a6744e6f289cb10272ddcc90e2c93c525454ba6c346ad4196e2505bb1e8beb
                                                                                                                                                                                                  • Instruction ID: 3995f7f72e4493518f754db1ed509c3e81561eca55e98dcea242d24904d1180d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d9a6744e6f289cb10272ddcc90e2c93c525454ba6c346ad4196e2505bb1e8beb
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B211DB32A8A70ABAA70597549C82EAB7BDCDF15774F11006AF500B51C1EBA0AE0073E5
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                                                                                                  • String ID: 0.0.0.0
                                                                                                                                                                                                  • API String ID: 642191829-3771769585
                                                                                                                                                                                                  • Opcode ID: 8fc47cb004c0841568b37e6300b0a67f5119660bdd6969aef98a871c16b75149
                                                                                                                                                                                                  • Instruction ID: 9c6c8e799f5fc7ba66a73a3a6ca68decb1168fe38d0cd3ea621891b3db0a893e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8fc47cb004c0841568b37e6300b0a67f5119660bdd6969aef98a871c16b75149
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AA11E771904119ABCB206B20AC0AEFF7BBCDF50730F050169F595A7091EFB59A81AAA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                  • GetSystemMetrics.USER32(0000000F), ref: 00F69FC7
                                                                                                                                                                                                  • GetSystemMetrics.USER32(0000000F), ref: 00F69FE7
                                                                                                                                                                                                  • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00F6A224
                                                                                                                                                                                                  • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00F6A242
                                                                                                                                                                                                  • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00F6A263
                                                                                                                                                                                                  • ShowWindow.USER32(00000003,00000000), ref: 00F6A282
                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001), ref: 00F6A2A7
                                                                                                                                                                                                  • DefDlgProcW.USER32(?,00000005,?,?), ref: 00F6A2CA
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1211466189-0
                                                                                                                                                                                                  • Opcode ID: f71ac3ff6b1c4bd1efc8c70dfc03b692fbe60b24d132e39d22737f9c0d3f2f58
                                                                                                                                                                                                  • Instruction ID: fbd4b8e506c58c9202c1fa1da782e1d71376f26c197ff7a21b1a80787366647f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f71ac3ff6b1c4bd1efc8c70dfc03b692fbe60b24d132e39d22737f9c0d3f2f58
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 67B1DC31A00219DFDF14CF68C9947AE3BB2FF45711F098069EC89AB295D771A940EF51
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen$LocalTime
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 952045576-0
                                                                                                                                                                                                  • Opcode ID: 3ef39e936a444fa6c5927442814559e7ad97804ccbef7cda5713c8cb3eb7b082
                                                                                                                                                                                                  • Instruction ID: 086149c3800c635f1077d55c183cfd7827e553f9208ed340457e4308ac038a62
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3ef39e936a444fa6c5927442814559e7ad97804ccbef7cda5713c8cb3eb7b082
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5A41BF65D1021CA6DB11EBB48C8A9DFB7ECAF45710F409466E618F3161EB34E245C3E5
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00F2682C,00000004,00000000,00000000), ref: 00EEF953
                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00F2682C,00000004,00000000,00000000), ref: 00F2F3D1
                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00F2682C,00000004,00000000,00000000), ref: 00F2F454
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ShowWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1268545403-0
                                                                                                                                                                                                  • Opcode ID: 2fb31a280774299fe25f3206f2f4a46d2421140fb86f0d38a6666b769bfcaba6
                                                                                                                                                                                                  • Instruction ID: edced41ceae0b0892012b447ed8511c09eb0f5b67adc13207d7d988b1b346e3e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2fb31a280774299fe25f3206f2f4a46d2421140fb86f0d38a6666b769bfcaba6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D9416C315042C8BAC734DB6AE88877A7BA1AFC6314F15603DE0C777562C677D880EB11
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DeleteObject.GDI32(00000000), ref: 00F62D1B
                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 00F62D23
                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F62D2E
                                                                                                                                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00F62D3A
                                                                                                                                                                                                  • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00F62D76
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00F62D87
                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00F65A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00F62DC2
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00F62DE1
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3864802216-0
                                                                                                                                                                                                  • Opcode ID: beab8fef33398390b95a9c0d0464a4f7a6d39c55b75974318dc044b272082834
                                                                                                                                                                                                  • Instruction ID: c86ade9eb362ba464f3947d0980e61655e2569a3f46fb9ae2eb1162e5ba5c5d8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: beab8fef33398390b95a9c0d0464a4f7a6d39c55b75974318dc044b272082834
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 73316B72201614BBEB118F54CC8AFFB3BA9EF09725F044055FE889A291C6B59C51DBA4
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _memcmp
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2931989736-0
                                                                                                                                                                                                  • Opcode ID: 5cb7465f232adbfe6760ec6fc8f4d2e127a8732396e495fe1800ce9792658107
                                                                                                                                                                                                  • Instruction ID: f947f90b9d14e90102716d29a1003f3c5de6fcdd751f909f1dec4e541baed20b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5cb7465f232adbfe6760ec6fc8f4d2e127a8732396e495fe1800ce9792658107
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E821C9B2B45A0DB7D61455209D83FFA339DAFA0BB4F850020FE05AA581F720EE14E5E6
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                                                                                                  • API String ID: 0-572801152
                                                                                                                                                                                                  • Opcode ID: b8a607047a28dc12636d9f667c1d22cd209850088bd4d2207b18660a549efc24
                                                                                                                                                                                                  • Instruction ID: 40167db24aba9bd369f19fada26c4e7b6c528a7118293bebe9d974e5e60f0f73
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b8a607047a28dc12636d9f667c1d22cd209850088bd4d2207b18660a549efc24
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E3D1E171E0060A9FDF10CFA8C890BAEB7B5BF48754F148069EE15AB281E770DD49DB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetCPInfo.KERNEL32(?,?), ref: 00F115CE
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00F11651
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F116E4
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00F116FB
                                                                                                                                                                                                    • Part of subcall function 00F03820: RtlAllocateHeap.NTDLL(00000000,?,00FA1444,?,00EEFDF5,?,?,00EDA976,00000010,00FA1440,00ED13FC,?,00ED13C6,?,00ED1129), ref: 00F03852
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F11777
                                                                                                                                                                                                  • __freea.LIBCMT ref: 00F117A2
                                                                                                                                                                                                  • __freea.LIBCMT ref: 00F117AE
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2829977744-0
                                                                                                                                                                                                  • Opcode ID: 3f997a9267800fb0bcb798ea4aba52bf1388ff6c92127289bec70bf1fc1b396e
                                                                                                                                                                                                  • Instruction ID: 3177b6289a96735ff6e5743dd924eb081798f97d81e7fad9f4a92dd186426fcc
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3f997a9267800fb0bcb798ea4aba52bf1388ff6c92127289bec70bf1fc1b396e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9D91B672E002169EDF208E74DC41AEE7BB6BF49720F184659EA05E7281D735DDC4EBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Variant$ClearInit
                                                                                                                                                                                                  • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                                                                                                  • API String ID: 2610073882-625585964
                                                                                                                                                                                                  • Opcode ID: 406e4e37994e05abbde8c64c057e2565f534046f40f485de87f9f3f8cffc444e
                                                                                                                                                                                                  • Instruction ID: 80cf2f6875409a2264081aa92d19d5f4a3f92b9a14faa4448ce2df135253ed97
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 406e4e37994e05abbde8c64c057e2565f534046f40f485de87f9f3f8cffc444e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7791C631E00219ABDF20CF55DC44FAEBBB8EF45715F108119FA05AB180D770A989DFA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00F4125C
                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00F41284
                                                                                                                                                                                                  • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00F412A8
                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00F412D8
                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00F4135F
                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00F413C4
                                                                                                                                                                                                  • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00F41430
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2550207440-0
                                                                                                                                                                                                  • Opcode ID: ea22393d70089fd8011a68655efeb018773a11f9fe5f91ecb919208b8e677d65
                                                                                                                                                                                                  • Instruction ID: 823740629c21ea2b1c0afa58886d6b6e23196dfd99b045ed8d092ab26d4c227e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ea22393d70089fd8011a68655efeb018773a11f9fe5f91ecb919208b8e677d65
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B391F476E002189FDB00DF94C884BBE7BB5FF45324F144129ED50E72A1D7B8A981EB90
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3225163088-0
                                                                                                                                                                                                  • Opcode ID: 2b413d2180c286ad1dade5da4e36723ee652f59377518b6d909e156b87e5a237
                                                                                                                                                                                                  • Instruction ID: 42d07238f68e130b0f7c84d587a55dfefa7a2cf515571472c2f88560e53b883a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2b413d2180c286ad1dade5da4e36723ee652f59377518b6d909e156b87e5a237
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FF912671D00219EFCB10CFAACC84AEEBBB8FF49320F149559E515B7292D774A941DBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00F5396B
                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,?), ref: 00F53A7A
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F53A8A
                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00F53C1F
                                                                                                                                                                                                    • Part of subcall function 00F40CDF: VariantInit.OLEAUT32(00000000), ref: 00F40D1F
                                                                                                                                                                                                    • Part of subcall function 00F40CDF: VariantCopy.OLEAUT32(?,?), ref: 00F40D28
                                                                                                                                                                                                    • Part of subcall function 00F40CDF: VariantClear.OLEAUT32(?), ref: 00F40D34
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                                                                                                                  • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                                                                                                  • API String ID: 4137639002-1221869570
                                                                                                                                                                                                  • Opcode ID: 52654616135c1eda8c4a93731026223b5d94da86fa671f5ef2a652ca9e9e4201
                                                                                                                                                                                                  • Instruction ID: 2ce3e4f2856ab8f690f10c849aa56ed1a96dcaddb1cd6a4e53b863793946b5b5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 52654616135c1eda8c4a93731026223b5d94da86fa671f5ef2a652ca9e9e4201
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BD91BE75A083059FC704DF28C48092AB7E5FF88355F04892EF9899B351DB35EE4ADB82
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F3000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?,?,?,00F3035E), ref: 00F3002B
                                                                                                                                                                                                    • Part of subcall function 00F3000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?,?), ref: 00F30046
                                                                                                                                                                                                    • Part of subcall function 00F3000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?,?), ref: 00F30054
                                                                                                                                                                                                    • Part of subcall function 00F3000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?), ref: 00F30064
                                                                                                                                                                                                  • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00F54C51
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F54D59
                                                                                                                                                                                                  • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00F54DCF
                                                                                                                                                                                                  • CoTaskMemFree.OLE32(?), ref: 00F54DDA
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                                                                                                                  • String ID: NULL Pointer assignment
                                                                                                                                                                                                  • API String ID: 614568839-2785691316
                                                                                                                                                                                                  • Opcode ID: e0251c608c5f2ab7df27b6f99daffeea8146f68ac626fa155a92ce1453cf3615
                                                                                                                                                                                                  • Instruction ID: a8870baab69411dcf37586a3cf9a831c6051735a157a54a23ad54e896fa17d67
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e0251c608c5f2ab7df27b6f99daffeea8146f68ac626fa155a92ce1453cf3615
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9B913671D0021D9BDF14DFA4D891AEEB7B8FF48314F10416AE915B7281DB34AA499FA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetMenu.USER32(?), ref: 00F62183
                                                                                                                                                                                                  • GetMenuItemCount.USER32(00000000), ref: 00F621B5
                                                                                                                                                                                                  • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00F621DD
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F62213
                                                                                                                                                                                                  • GetMenuItemID.USER32(?,?), ref: 00F6224D
                                                                                                                                                                                                  • GetSubMenu.USER32(?,?), ref: 00F6225B
                                                                                                                                                                                                    • Part of subcall function 00F33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F33A57
                                                                                                                                                                                                    • Part of subcall function 00F33A3D: GetCurrentThreadId.KERNEL32 ref: 00F33A5E
                                                                                                                                                                                                    • Part of subcall function 00F33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F325B3), ref: 00F33A65
                                                                                                                                                                                                  • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00F622E3
                                                                                                                                                                                                    • Part of subcall function 00F3E97B: Sleep.KERNEL32 ref: 00F3E9F3
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4196846111-0
                                                                                                                                                                                                  • Opcode ID: 01af7916dbcdc06a411ec0bc792e26814f3cfef817805a12e46fc4c3428c67df
                                                                                                                                                                                                  • Instruction ID: c6d86f7a83abb75a4b2dd218f61c04d54cb48d00aaffad92daf2f5665a9a06b2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 01af7916dbcdc06a411ec0bc792e26814f3cfef817805a12e46fc4c3428c67df
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5B719E76E00605AFCB50DF64C881AAEB7F1EF89320F148459E856FB351DB74EE419B90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • IsWindow.USER32(015C5F40), ref: 00F67F37
                                                                                                                                                                                                  • IsWindowEnabled.USER32(015C5F40), ref: 00F67F43
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00F6801E
                                                                                                                                                                                                  • SendMessageW.USER32(015C5F40,000000B0,?,?), ref: 00F68051
                                                                                                                                                                                                  • IsDlgButtonChecked.USER32(?,?), ref: 00F68089
                                                                                                                                                                                                  • GetWindowLongW.USER32(015C5F40,000000EC), ref: 00F680AB
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00F680C3
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4072528602-0
                                                                                                                                                                                                  • Opcode ID: 944772c7ff47551ddecbf8477b74b9381b8fc5c6ac38a853823ea2c6648bff7d
                                                                                                                                                                                                  • Instruction ID: 654fdad630e66367bf704670db770a6b1e9a45d99201ecbf60a4757d07e8ba75
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 944772c7ff47551ddecbf8477b74b9381b8fc5c6ac38a853823ea2c6648bff7d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9871CF34A08344AFEB20AF64CC84FBA7BB5FF0A364F140459F99593261CB71AC45EB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetParent.USER32(?), ref: 00F3AEF9
                                                                                                                                                                                                  • GetKeyboardState.USER32(?), ref: 00F3AF0E
                                                                                                                                                                                                  • SetKeyboardState.USER32(?), ref: 00F3AF6F
                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,00000010,?), ref: 00F3AF9D
                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,00000011,?), ref: 00F3AFBC
                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,00000012,?), ref: 00F3AFFD
                                                                                                                                                                                                  • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00F3B020
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 87235514-0
                                                                                                                                                                                                  • Opcode ID: ec28a4f330a7c2e79d29c4748640083345510e042973a202d407b1bdf6f8b73c
                                                                                                                                                                                                  • Instruction ID: cf8908a3756a3ae36f992ce0c1e8cd1a274aa62675de5388fbc7f130d55f97fe
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ec28a4f330a7c2e79d29c4748640083345510e042973a202d407b1bdf6f8b73c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6051D1A0A047D53DFB364235CC55BBBBEA95B06324F088589E2E9598C2C3D9ECC8E751
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetParent.USER32(00000000), ref: 00F3AD19
                                                                                                                                                                                                  • GetKeyboardState.USER32(?), ref: 00F3AD2E
                                                                                                                                                                                                  • SetKeyboardState.USER32(?), ref: 00F3AD8F
                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00F3ADBB
                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00F3ADD8
                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00F3AE17
                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00F3AE38
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 87235514-0
                                                                                                                                                                                                  • Opcode ID: aa7c8d9886e728dd63038d90f9545d8c10843d34644216b3b0c78ce0c73ab79e
                                                                                                                                                                                                  • Instruction ID: 6a05d8a753f34078de1c68a21b7f3c240e48d43873b6929e25d43325b5c74ca7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: aa7c8d9886e728dd63038d90f9545d8c10843d34644216b3b0c78ce0c73ab79e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5851D5A1A047D53DFB378336CC55B7A7EA85B46320F088588E1D94A8C2D394ECD8F762
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetConsoleCP.KERNEL32(00F13CD6,?,?,?,?,?,?,?,?,00F05BA3,?,?,00F13CD6,?,?), ref: 00F05470
                                                                                                                                                                                                  • __fassign.LIBCMT ref: 00F054EB
                                                                                                                                                                                                  • __fassign.LIBCMT ref: 00F05506
                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00F13CD6,00000005,00000000,00000000), ref: 00F0552C
                                                                                                                                                                                                  • WriteFile.KERNEL32(?,00F13CD6,00000000,00F05BA3,00000000,?,?,?,?,?,?,?,?,?,00F05BA3,?), ref: 00F0554B
                                                                                                                                                                                                  • WriteFile.KERNEL32(?,?,00000001,00F05BA3,00000000,?,?,?,?,?,?,?,?,?,00F05BA3,?), ref: 00F05584
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1324828854-0
                                                                                                                                                                                                  • Opcode ID: ef7959e9c85ebb7e0dfa019300e5326decb2327b90d51fffdf8c075dfbe491d9
                                                                                                                                                                                                  • Instruction ID: 04175f3389c240c4d3eb6b7efce666e23f7ec0907fabbf15c28e6b50c68a733a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ef7959e9c85ebb7e0dfa019300e5326decb2327b90d51fffdf8c075dfbe491d9
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DD51C0B1A006099FDB10CFA8DC45AEEBBF9EF09710F18411AE955E7291D7709A41EF60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F5304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F5307A
                                                                                                                                                                                                    • Part of subcall function 00F5304E: _wcslen.LIBCMT ref: 00F5309B
                                                                                                                                                                                                  • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00F51112
                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00F51121
                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00F511C9
                                                                                                                                                                                                  • closesocket.WSOCK32(00000000), ref: 00F511F9
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2675159561-0
                                                                                                                                                                                                  • Opcode ID: e747bda0b65bbccd5f1843480a1ef8267e12973cca9502961128cf90be79001d
                                                                                                                                                                                                  • Instruction ID: b7de8aaa380d35272b9f3895deaeade55682c3a0c5e52ba448677871037848e2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e747bda0b65bbccd5f1843480a1ef8267e12973cca9502961128cf90be79001d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C7412731600A08AFDB109F24C884BA9BBE9FF45365F148099FE559B291C774FD45DBE0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F3DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F3CF22,?), ref: 00F3DDFD
                                                                                                                                                                                                    • Part of subcall function 00F3DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F3CF22,?), ref: 00F3DE16
                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00F3CF45
                                                                                                                                                                                                  • MoveFileW.KERNEL32(?,?), ref: 00F3CF7F
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F3D005
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F3D01B
                                                                                                                                                                                                  • SHFileOperationW.SHELL32(?), ref: 00F3D061
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                                                                                                                  • String ID: \*.*
                                                                                                                                                                                                  • API String ID: 3164238972-1173974218
                                                                                                                                                                                                  • Opcode ID: f3d5c665f4403a684b025411d26f128502cd2a638692bdc335317caef08000cb
                                                                                                                                                                                                  • Instruction ID: 27511c0770a151218cd15fd83323431c700791ab8c3eaa3112ab92722baf1496
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f3d5c665f4403a684b025411d26f128502cd2a638692bdc335317caef08000cb
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7D414475D0521C9EDF12EBA4DD81AEEB7B8AF08390F1000E6E545FB142EA34A649DF50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00F62E1C
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00F62E4F
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00F62E84
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00F62EB6
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00F62EE0
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00F62EF1
                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F62F0B
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: LongWindow$MessageSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2178440468-0
                                                                                                                                                                                                  • Opcode ID: 450811b07a2ad3708ee9ea6c8ec86a9ed346db20ad73692ff8edeb99c0534bc1
                                                                                                                                                                                                  • Instruction ID: e8ff89989f4d842d92ba31293cf8bd09fd40c79885add8110c3c8835bae23da2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 450811b07a2ad3708ee9ea6c8ec86a9ed346db20ad73692ff8edeb99c0534bc1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B6311531A445489FEB60CF58DC84F6537E0FB6A720F150165F9948B2B2CBB2A840FB41
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F37769
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F3778F
                                                                                                                                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 00F37792
                                                                                                                                                                                                  • SysAllocString.OLEAUT32(?), ref: 00F377B0
                                                                                                                                                                                                  • SysFreeString.OLEAUT32(?), ref: 00F377B9
                                                                                                                                                                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 00F377DE
                                                                                                                                                                                                  • SysAllocString.OLEAUT32(?), ref: 00F377EC
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3761583154-0
                                                                                                                                                                                                  • Opcode ID: 8b8a859b1a63203a26fd2a472458678adb859cb69e4ff15c51265d0f3a6cfe1e
                                                                                                                                                                                                  • Instruction ID: 7112c88325ec57a9581cf63c0e2e8ce99a4986f26122f1cb75f9692d1b7bb9ec
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8b8a859b1a63203a26fd2a472458678adb859cb69e4ff15c51265d0f3a6cfe1e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A4218376608219AFDB20EFA9CC84DBB77ACEB09774B048025F955DB150D670DC41E7A0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F37842
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00F37868
                                                                                                                                                                                                  • SysAllocString.OLEAUT32(00000000), ref: 00F3786B
                                                                                                                                                                                                  • SysAllocString.OLEAUT32 ref: 00F3788C
                                                                                                                                                                                                  • SysFreeString.OLEAUT32 ref: 00F37895
                                                                                                                                                                                                  • StringFromGUID2.OLE32(?,?,00000028), ref: 00F378AF
                                                                                                                                                                                                  • SysAllocString.OLEAUT32(?), ref: 00F378BD
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3761583154-0
                                                                                                                                                                                                  • Opcode ID: 335b38ac4b4c3d82f721ab6b845f011e3a741e3ad0371023b5e9832312a7f6b7
                                                                                                                                                                                                  • Instruction ID: c7cabeda1fb1161eb5d01e767dd3d364ad23f33858c7f5e8ab61b89f71ced98a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 335b38ac4b4c3d82f721ab6b845f011e3a741e3ad0371023b5e9832312a7f6b7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5221A771604209AFDB20EFB9DC88DBA77ECEB09370B108125F955DB1A1DA70DC41EB64
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetStdHandle.KERNEL32(0000000C), ref: 00F404F2
                                                                                                                                                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F4052E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateHandlePipe
                                                                                                                                                                                                  • String ID: nul
                                                                                                                                                                                                  • API String ID: 1424370930-2873401336
                                                                                                                                                                                                  • Opcode ID: 48ca51910e7a2e820baa087bc76660ec034145b5abf7d1068419ac2316626ad9
                                                                                                                                                                                                  • Instruction ID: e084b37d91ae2dcafc6f07258085f293ea0578b9cf29cbe1710d1a9f44ccf4d2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 48ca51910e7a2e820baa087bc76660ec034145b5abf7d1068419ac2316626ad9
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7B215E75900305ABDB209F29DC44AAA7BA4EF45724F244A19EEE1D72E0DBB09940EF60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetStdHandle.KERNEL32(000000F6), ref: 00F405C6
                                                                                                                                                                                                  • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00F40601
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateHandlePipe
                                                                                                                                                                                                  • String ID: nul
                                                                                                                                                                                                  • API String ID: 1424370930-2873401336
                                                                                                                                                                                                  • Opcode ID: b77cee02ba65c305d4526cce1ecf41bce7306c26c70ad8b95eb5373bdb084b59
                                                                                                                                                                                                  • Instruction ID: 31a2a66547898df9437d24b0897c100ca35ed2e4cf084c1687905c6267b61c4c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b77cee02ba65c305d4526cce1ecf41bce7306c26c70ad8b95eb5373bdb084b59
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D92183759003059BDB209F698C14A6A7BE4AF95730F204A19FEE2E72D0DBB09860EB50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00ED604C
                                                                                                                                                                                                    • Part of subcall function 00ED600E: GetStockObject.GDI32(00000011), ref: 00ED6060
                                                                                                                                                                                                    • Part of subcall function 00ED600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00ED606A
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00F64112
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00F6411F
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00F6412A
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00F64139
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00F64145
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                                                                                                  • String ID: Msctls_Progress32
                                                                                                                                                                                                  • API String ID: 1025951953-3636473452
                                                                                                                                                                                                  • Opcode ID: 9520a7e04512df056b124f66f4e9a8f2e87c9346f5a6852e60a43234b2ebc976
                                                                                                                                                                                                  • Instruction ID: 35c83d11b1acb4e7a3c33fa8513263a572153d234890d8925f910fef6584d21d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9520a7e04512df056b124f66f4e9a8f2e87c9346f5a6852e60a43234b2ebc976
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7E1193B215021D7EEF119E64CC85EE77F5DEF09798F014111BA18A2150C6769C61ABA4
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F0D7A3: _free.LIBCMT ref: 00F0D7CC
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0D82D
                                                                                                                                                                                                    • Part of subcall function 00F029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000), ref: 00F029DE
                                                                                                                                                                                                    • Part of subcall function 00F029C8: GetLastError.KERNEL32(00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000,00000000), ref: 00F029F0
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0D838
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0D843
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0D897
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0D8A2
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0D8AD
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0D8B8
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 776569668-0
                                                                                                                                                                                                  • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                  • Instruction ID: e2a60286c13dcd70f956bb8557ac41d35ab3dbd924911d6c808809d5dcaecf59
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A1112E71940B04AAD665BFF4CC4BFCBBBECAF44700F804825B299A64D2DA79B505B660
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00F3DA74
                                                                                                                                                                                                  • LoadStringW.USER32(00000000), ref: 00F3DA7B
                                                                                                                                                                                                  • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00F3DA91
                                                                                                                                                                                                  • LoadStringW.USER32(00000000), ref: 00F3DA98
                                                                                                                                                                                                  • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00F3DADC
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • %s (%d) : ==> %s: %s %s, xrefs: 00F3DAB9
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: HandleLoadModuleString$Message
                                                                                                                                                                                                  • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                                                                                                  • API String ID: 4072794657-3128320259
                                                                                                                                                                                                  • Opcode ID: 91df52bb5d06dfbf903f2a28672a63c6a1b6f549750da7dfddb92dc2e57dc9d6
                                                                                                                                                                                                  • Instruction ID: 58c7d82f391fac4a34b724d17430c6caa448279240f83b2041ab856baf92cf6b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 91df52bb5d06dfbf903f2a28672a63c6a1b6f549750da7dfddb92dc2e57dc9d6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CF0162F290020C7FEB10ABA4DD89EF7726CE708711F400492F796E2042E6B49E845FB4
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • InterlockedExchange.KERNEL32(015BE7E0,015BE7E0), ref: 00F4097B
                                                                                                                                                                                                  • EnterCriticalSection.KERNEL32(015BE7C0,00000000), ref: 00F4098D
                                                                                                                                                                                                  • TerminateThread.KERNEL32(?,000001F6), ref: 00F4099B
                                                                                                                                                                                                  • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00F409A9
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00F409B8
                                                                                                                                                                                                  • InterlockedExchange.KERNEL32(015BE7E0,000001F6), ref: 00F409C8
                                                                                                                                                                                                  • LeaveCriticalSection.KERNEL32(015BE7C0), ref: 00F409CF
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3495660284-0
                                                                                                                                                                                                  • Opcode ID: f3657526b0db5dadf3c940050a0c61c278f222afb68f8743dec1fdcad43422b0
                                                                                                                                                                                                  • Instruction ID: b9d4bc3a99e2238a4621efc6440102f70e72e629453b791e8a0854666f60c96e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f3657526b0db5dadf3c940050a0c61c278f222afb68f8743dec1fdcad43422b0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E7F03131442506BBD7415FA5EE9DBE67B35FF01712F401015F691508A0CBB59465EFE0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 00ED5D30
                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00ED5D71
                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00ED5D99
                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 00ED5ED7
                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00ED5EF8
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Rect$Client$Window$Screen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1296646539-0
                                                                                                                                                                                                  • Opcode ID: 1e961c9e193d32cb5737bc793ed6c4b3d8e7ae1de2f5cf6b32b7c2db1a19ffa6
                                                                                                                                                                                                  • Instruction ID: 00b6c4bbf69a5b0540ef9ad4e8583818f39db58dc9041b49b272e626a8101ea8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1e961c9e193d32cb5737bc793ed6c4b3d8e7ae1de2f5cf6b32b7c2db1a19ffa6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5FB18C35A0074ADBDB10DFA9C4807EEB7F1FF58320F14951AE8A9E7250DB30AA91DB54
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • __allrem.LIBCMT ref: 00F000BA
                                                                                                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F000D6
                                                                                                                                                                                                  • __allrem.LIBCMT ref: 00F000ED
                                                                                                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F0010B
                                                                                                                                                                                                  • __allrem.LIBCMT ref: 00F00122
                                                                                                                                                                                                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00F00140
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1992179935-0
                                                                                                                                                                                                  • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                                                                                                                                  • Instruction ID: c9ebbac99738b6a0f89055187a369d5b971c20873014b5e11372f7b9ae99fabf
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7281D872A00B069BE7249E68CC41B6BB3E9AF45734F24463AF651D62C1EB74D940B790
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F53149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,00F5101C,00000000,?,?,00000000), ref: 00F53195
                                                                                                                                                                                                  • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00F51DC0
                                                                                                                                                                                                  • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00F51DE1
                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00F51DF2
                                                                                                                                                                                                  • inet_ntoa.WSOCK32(?), ref: 00F51E8C
                                                                                                                                                                                                  • htons.WSOCK32(?,?,?,?,?), ref: 00F51EDB
                                                                                                                                                                                                  • _strlen.LIBCMT ref: 00F51F35
                                                                                                                                                                                                    • Part of subcall function 00F339E8: _strlen.LIBCMT ref: 00F339F2
                                                                                                                                                                                                    • Part of subcall function 00ED6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,00EECF58,?,?,?), ref: 00ED6DBA
                                                                                                                                                                                                    • Part of subcall function 00ED6D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,00EECF58,?,?,?), ref: 00ED6DED
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1923757996-0
                                                                                                                                                                                                  • Opcode ID: 3d48e245eabe47e91604e1e80e6c2edeec95b707aebe4d86eac70c69a054d777
                                                                                                                                                                                                  • Instruction ID: 88a075e8d91f221bd623fd418bf478e37c91a5886c282ce4b66d70ffe4f8ba7a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3d48e245eabe47e91604e1e80e6c2edeec95b707aebe4d86eac70c69a054d777
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0DA1CE31604340AFC324DB24C885F2A7BE5BF84328F54994DF9566B2A2CB71ED4ADB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00EF82D9,00EF82D9,?,?,?,00F0644F,00000001,00000001,?), ref: 00F06258
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00F0644F,00000001,00000001,?,?,?,?), ref: 00F062DE
                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00F063D8
                                                                                                                                                                                                  • __freea.LIBCMT ref: 00F063E5
                                                                                                                                                                                                    • Part of subcall function 00F03820: RtlAllocateHeap.NTDLL(00000000,?,00FA1444,?,00EEFDF5,?,?,00EDA976,00000010,00FA1440,00ED13FC,?,00ED13C6,?,00ED1129), ref: 00F03852
                                                                                                                                                                                                  • __freea.LIBCMT ref: 00F063EE
                                                                                                                                                                                                  • __freea.LIBCMT ref: 00F06413
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1414292761-0
                                                                                                                                                                                                  • Opcode ID: ab7c8a0c069f30054eb64f623d59ab76d919b897769b24d88b542fafc45f9ebd
                                                                                                                                                                                                  • Instruction ID: 4873cb8a7ce7a7298f531373502843b0a1f2ff65bf91c488e5fc5d6a5ad1f46f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ab7c8a0c069f30054eb64f623d59ab76d919b897769b24d88b542fafc45f9ebd
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 52519072A00216ABDB258F64DD81EBF77AAEF44760F154629F905D62C0DB34DC60F6A0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                    • Part of subcall function 00F5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F5B6AE,?,?), ref: 00F5C9B5
                                                                                                                                                                                                    • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5C9F1
                                                                                                                                                                                                    • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA68
                                                                                                                                                                                                    • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA9E
                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F5BCCA
                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F5BD25
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00F5BD6A
                                                                                                                                                                                                  • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00F5BD99
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00F5BDF3
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?), ref: 00F5BDFF
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1120388591-0
                                                                                                                                                                                                  • Opcode ID: b4e885cede6212d4b56aa7f110d3992ab3482b5e07465acdf47948ca4bf093da
                                                                                                                                                                                                  • Instruction ID: 25cf19a20f1f5df71442be76e58b6cc242a11fe80959577770b1cb6bbba2c0d9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b4e885cede6212d4b56aa7f110d3992ab3482b5e07465acdf47948ca4bf093da
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 12819E31608241AFC714DF24C895E2ABBF5FF84318F14856DF9958B2A2DB31ED09DB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • VariantInit.OLEAUT32(00000035), ref: 00F2F7B9
                                                                                                                                                                                                  • SysAllocString.OLEAUT32(00000001), ref: 00F2F860
                                                                                                                                                                                                  • VariantCopy.OLEAUT32(00F2FA64,00000000), ref: 00F2F889
                                                                                                                                                                                                  • VariantClear.OLEAUT32(00F2FA64), ref: 00F2F8AD
                                                                                                                                                                                                  • VariantCopy.OLEAUT32(00F2FA64,00000000), ref: 00F2F8B1
                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00F2F8BB
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Variant$ClearCopy$AllocInitString
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3859894641-0
                                                                                                                                                                                                  • Opcode ID: d03ba7d5f14aa5cbed12cec9b999a381379f50f0f40b83fa093b328df74abdc8
                                                                                                                                                                                                  • Instruction ID: 528e734bf77bbcf94db8eb7bf0053ef1c1c9942629250542b672ba5e9a8b5e25
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d03ba7d5f14aa5cbed12cec9b999a381379f50f0f40b83fa093b328df74abdc8
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AF51D731920324BADF10AB65EC95B29B3F4EF45310B205477E805EF291DB748C84E796
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED7620: _wcslen.LIBCMT ref: 00ED7625
                                                                                                                                                                                                    • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                  • GetOpenFileNameW.COMDLG32(00000058), ref: 00F494E5
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F49506
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F4952D
                                                                                                                                                                                                  • GetSaveFileNameW.COMDLG32(00000058), ref: 00F49585
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen$FileName$OpenSave
                                                                                                                                                                                                  • String ID: X
                                                                                                                                                                                                  • API String ID: 83654149-3081909835
                                                                                                                                                                                                  • Opcode ID: 19ccc10f830986126f6160438136e7c73465e65a1cd5a51b0b27d6785eed5d60
                                                                                                                                                                                                  • Instruction ID: f61094a34bdf45d196b5d05636a5d2be18ddfcad6f4db4f4c99ac1c455ab3806
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 19ccc10f830986126f6160438136e7c73465e65a1cd5a51b0b27d6785eed5d60
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 20E19131A083418FD714DF24C881A6BBBE5FF85314F14856EE889AB3A2DB71DD05DB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                  • BeginPaint.USER32(?,?,?), ref: 00EE9241
                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00EE92A5
                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00EE92C2
                                                                                                                                                                                                  • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00EE92D3
                                                                                                                                                                                                  • EndPaint.USER32(?,?,?,?,?), ref: 00EE9321
                                                                                                                                                                                                  • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00F271EA
                                                                                                                                                                                                    • Part of subcall function 00EE9339: BeginPath.GDI32(00000000), ref: 00EE9357
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3050599898-0
                                                                                                                                                                                                  • Opcode ID: 9a77512d9c50e5da77943166f26123ad855ba4423776a6db69c24fa76278f378
                                                                                                                                                                                                  • Instruction ID: a0dc174edd09f8269b3feaae1ade423fb64ce7ad684e128e1162a9e18fa8f6ab
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9a77512d9c50e5da77943166f26123ad855ba4423776a6db69c24fa76278f378
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4A419D70104358AFD721DF25D884FBA7BE8EF4A760F140229F9A4971E2C7719845EB62
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • InterlockedExchange.KERNEL32(?,000001F5), ref: 00F4080C
                                                                                                                                                                                                  • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00F40847
                                                                                                                                                                                                  • EnterCriticalSection.KERNEL32(?), ref: 00F40863
                                                                                                                                                                                                  • LeaveCriticalSection.KERNEL32(?), ref: 00F408DC
                                                                                                                                                                                                  • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00F408F3
                                                                                                                                                                                                  • InterlockedExchange.KERNEL32(?,000001F6), ref: 00F40921
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3368777196-0
                                                                                                                                                                                                  • Opcode ID: 114ce7a66f2c085a0ffcda5e7ddebd99a0abb41ab3237feab385a9fb8f957cee
                                                                                                                                                                                                  • Instruction ID: 8b9ac1c6ef9d631e47b2aa68783fd599631380b61835c154e03e9919d934dc73
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 114ce7a66f2c085a0ffcda5e7ddebd99a0abb41ab3237feab385a9fb8f957cee
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 54415E71900209EBDF149F55DC85A6A7BB8FF04310F1440A5ED00AA2A7DB70EE65EBA4
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00F2F3AB,00000000,?,?,00000000,?,00F2682C,00000004,00000000,00000000), ref: 00F6824C
                                                                                                                                                                                                  • EnableWindow.USER32(?,00000000), ref: 00F68272
                                                                                                                                                                                                  • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00F682D1
                                                                                                                                                                                                  • ShowWindow.USER32(?,00000004), ref: 00F682E5
                                                                                                                                                                                                  • EnableWindow.USER32(?,00000001), ref: 00F6830B
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00F6832F
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$Show$Enable$MessageSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 642888154-0
                                                                                                                                                                                                  • Opcode ID: ea38265326bf15a11f529573e1a1d4fae2408fe52ca65459c163d7cead954435
                                                                                                                                                                                                  • Instruction ID: dd5e4dcdcdf529a048cf4601a7b908238baae426c69654e0152bc6db4edbdacc
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ea38265326bf15a11f529573e1a1d4fae2408fe52ca65459c163d7cead954435
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DF41C570A01648AFDB21CF15CCA9BE57BE0FB0A764F19436DE5584B262CB71A842EF50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • IsWindowVisible.USER32(?), ref: 00F34C95
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00F34CB2
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00F34CEA
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F34D08
                                                                                                                                                                                                  • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00F34D10
                                                                                                                                                                                                  • _wcsstr.LIBVCRUNTIME ref: 00F34D1A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 72514467-0
                                                                                                                                                                                                  • Opcode ID: fd7c85bdd8f185a79215b72b4198eefb0624ea797147f26209800cb925335bb0
                                                                                                                                                                                                  • Instruction ID: 56752c3b803e2c2d820813b4488cf4dd9eda37e834dd283bc00fb4e38ccddd68
                                                                                                                                                                                                  • Opcode Fuzzy Hash: fd7c85bdd8f185a79215b72b4198eefb0624ea797147f26209800cb925335bb0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 962129726042057BEB155B35EC09E7B7BDCDF45770F108029F809DA1A2EAA1FC00A6A0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED3AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00ED3A97,?,?,00ED2E7F,?,?,?,00000000), ref: 00ED3AC2
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F4587B
                                                                                                                                                                                                  • CoInitialize.OLE32(00000000), ref: 00F45995
                                                                                                                                                                                                  • CoCreateInstance.OLE32(00F6FCF8,00000000,00000001,00F6FB68,?), ref: 00F459AE
                                                                                                                                                                                                  • CoUninitialize.OLE32 ref: 00F459CC
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                                                                                                                  • String ID: .lnk
                                                                                                                                                                                                  • API String ID: 3172280962-24824748
                                                                                                                                                                                                  • Opcode ID: e21549efcee53bccd517b0e614047c1558cc7777d8fbc7594ac32e36a5ea24c7
                                                                                                                                                                                                  • Instruction ID: ea7b60c9c5c3d94195ae71acb764f5db180eee369e70e99b555eb0a4b26e1657
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e21549efcee53bccd517b0e614047c1558cc7777d8fbc7594ac32e36a5ea24c7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 95D15571A08701DFC714EF24C480A2ABBE5EF89B24F14495DF8899B362DB31EC45DB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F30FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F30FCA
                                                                                                                                                                                                    • Part of subcall function 00F30FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F30FD6
                                                                                                                                                                                                    • Part of subcall function 00F30FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F30FE5
                                                                                                                                                                                                    • Part of subcall function 00F30FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F30FEC
                                                                                                                                                                                                    • Part of subcall function 00F30FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F31002
                                                                                                                                                                                                  • GetLengthSid.ADVAPI32(?,00000000,00F31335), ref: 00F317AE
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00F317BA
                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000), ref: 00F317C1
                                                                                                                                                                                                  • CopySid.ADVAPI32(00000000,00000000,?), ref: 00F317DA
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000,00F31335), ref: 00F317EE
                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00F317F5
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3008561057-0
                                                                                                                                                                                                  • Opcode ID: 83b80d3d3f08ac712547760291371b7fbd2bdfd24e92fa0e307d4fb017f92a70
                                                                                                                                                                                                  • Instruction ID: c2f37a0b64b5dabe0257625821a6591cbba509e9bdc55806e3d50a5bc5c5a9c8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 83b80d3d3f08ac712547760291371b7fbd2bdfd24e92fa0e307d4fb017f92a70
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 97118E32900209FFDB209FA4CC49BBF7BA9FB46365F184119F49197211D77AA944EBB0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00F314FF
                                                                                                                                                                                                  • OpenProcessToken.ADVAPI32(00000000), ref: 00F31506
                                                                                                                                                                                                  • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00F31515
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000004), ref: 00F31520
                                                                                                                                                                                                  • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00F3154F
                                                                                                                                                                                                  • DestroyEnvironmentBlock.USERENV(00000000), ref: 00F31563
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1413079979-0
                                                                                                                                                                                                  • Opcode ID: 6b44f2936b7a2107c58854bff58bd5278c91d72607426933f28b4aee5ffe87ff
                                                                                                                                                                                                  • Instruction ID: 44e413c78027b6c3e6d1c58de4aa1dced3b2a813651030c187d7604e44d3457b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6b44f2936b7a2107c58854bff58bd5278c91d72607426933f28b4aee5ffe87ff
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0211597250020DABDF11CF98DD49BEE7BA9FF49764F044015FA95A2160C3B18E60EBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,?,00EF3379,00EF2FE5), ref: 00EF3390
                                                                                                                                                                                                  • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00EF339E
                                                                                                                                                                                                  • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00EF33B7
                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,?,00EF3379,00EF2FE5), ref: 00EF3409
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3852720340-0
                                                                                                                                                                                                  • Opcode ID: aba2a28e5f8a35e0ed015a3df9baa5daa370a56b4a7bd0b8febba4243dff9c99
                                                                                                                                                                                                  • Instruction ID: c507616acfa497358faa3a46efb5aa52453f6480b8e6b4799ea29b16f355945b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: aba2a28e5f8a35e0ed015a3df9baa5daa370a56b4a7bd0b8febba4243dff9c99
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AF01243320A31DBEAA2567747C86A773ED4EB0537DB60222AF730E02F0EF514E116194
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,?,00F05686,00F13CD6,?,00000000,?,00F05B6A,?,?,?,?,?,00EFE6D1,?,00F98A48), ref: 00F02D78
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02DAB
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02DD3
                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,?,?,?,?,00EFE6D1,?,00F98A48,00000010,00ED4F4A,?,?,00000000,00F13CD6), ref: 00F02DE0
                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,?,?,?,?,00EFE6D1,?,00F98A48,00000010,00ED4F4A,?,?,00000000,00F13CD6), ref: 00F02DEC
                                                                                                                                                                                                  • _abort.LIBCMT ref: 00F02DF2
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorLast$_free$_abort
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3160817290-0
                                                                                                                                                                                                  • Opcode ID: 4ad9cc665e92777e9249ed0c48790646511de63cd6027b4f12056017a0d9acb6
                                                                                                                                                                                                  • Instruction ID: 3c3a6532aee50fcba7838f6b3b0eadcc090aba462ef5997e56b0f0b8ec062c9d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4ad9cc665e92777e9249ed0c48790646511de63cd6027b4f12056017a0d9acb6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A7F0CD3690650067C6A237397C0EE1E365D6FC1775F354415F864921D2DE68CC017170
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00EE9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00EE9693
                                                                                                                                                                                                    • Part of subcall function 00EE9639: SelectObject.GDI32(?,00000000), ref: 00EE96A2
                                                                                                                                                                                                    • Part of subcall function 00EE9639: BeginPath.GDI32(?), ref: 00EE96B9
                                                                                                                                                                                                    • Part of subcall function 00EE9639: SelectObject.GDI32(?,00000000), ref: 00EE96E2
                                                                                                                                                                                                  • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00F68A4E
                                                                                                                                                                                                  • LineTo.GDI32(?,00000003,00000000), ref: 00F68A62
                                                                                                                                                                                                  • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00F68A70
                                                                                                                                                                                                  • LineTo.GDI32(?,00000000,00000003), ref: 00F68A80
                                                                                                                                                                                                  • EndPath.GDI32(?), ref: 00F68A90
                                                                                                                                                                                                  • StrokePath.GDI32(?), ref: 00F68AA0
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 43455801-0
                                                                                                                                                                                                  • Opcode ID: e7fdc2225c3f6593a0cbed9fdb6ae762690269bf155a7d199d62e0c3b471f9ac
                                                                                                                                                                                                  • Instruction ID: ab33122d6432ef8c4603edcc3f58006bc654debc4b3dd413d62f8071478586f1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e7fdc2225c3f6593a0cbed9fdb6ae762690269bf155a7d199d62e0c3b471f9ac
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3511097600014DFFDF129F94DC88EAA7FACEB08390F008012FA699A1A1C7719D55EBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 00F35218
                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,00000058), ref: 00F35229
                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00F35230
                                                                                                                                                                                                  • ReleaseDC.USER32(00000000,00000000), ref: 00F35238
                                                                                                                                                                                                  • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00F3524F
                                                                                                                                                                                                  • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00F35261
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CapsDevice$Release
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1035833867-0
                                                                                                                                                                                                  • Opcode ID: d471534f294b170ce6c84e3a5ef2c9e03fc6e3032dc63ba80b21fe3e73fca9a7
                                                                                                                                                                                                  • Instruction ID: 828654e781799caa917c228db51069442823076e21fe1852ae217839081883a5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d471534f294b170ce6c84e3a5ef2c9e03fc6e3032dc63ba80b21fe3e73fca9a7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 62016275E01718BBEB109BA59C49E5EBFB8EF48761F044066FA49E7281D6B1DC00DFA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00ED1BF4
                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000010,00000000), ref: 00ED1BFC
                                                                                                                                                                                                  • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00ED1C07
                                                                                                                                                                                                  • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00ED1C12
                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000011,00000000), ref: 00ED1C1A
                                                                                                                                                                                                  • MapVirtualKeyW.USER32(00000012,00000000), ref: 00ED1C22
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Virtual
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4278518827-0
                                                                                                                                                                                                  • Opcode ID: 4c3224b0e7e9f1bf475be08068d13be393e6823eafd59037dceffe4edf63e05b
                                                                                                                                                                                                  • Instruction ID: bc72e9a3acc1946d024504ecf12baaf5cb09e241288932c9c864ed73892a688f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4c3224b0e7e9f1bf475be08068d13be393e6823eafd59037dceffe4edf63e05b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 500167B0902B5ABDE3008F6A8C85B52FFA8FF19354F00411BE15C4BA42C7F5A864CBE5
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00F3EB30
                                                                                                                                                                                                  • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00F3EB46
                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(?,?), ref: 00F3EB55
                                                                                                                                                                                                  • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F3EB64
                                                                                                                                                                                                  • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F3EB6E
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00F3EB75
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 839392675-0
                                                                                                                                                                                                  • Opcode ID: 4592c01941c76a88c9d10c13da2c85421a5dcf9fda3ac55eaa9a5e7131ef6c0e
                                                                                                                                                                                                  • Instruction ID: 96afd0186f5c883b6f60a2b021a372725cc85c858e49206bc16764875d3288c1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4592c01941c76a88c9d10c13da2c85421a5dcf9fda3ac55eaa9a5e7131ef6c0e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 01F01D72540158BBE6216752DC0EEBF7A7CEFCAB11F000158F6A2D119196E15A01A6F5
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetClientRect.USER32(?), ref: 00F27452
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001328,00000000,?), ref: 00F27469
                                                                                                                                                                                                  • GetWindowDC.USER32(?), ref: 00F27475
                                                                                                                                                                                                  • GetPixel.GDI32(00000000,?,?), ref: 00F27484
                                                                                                                                                                                                  • ReleaseDC.USER32(?,00000000), ref: 00F27496
                                                                                                                                                                                                  • GetSysColor.USER32(00000005), ref: 00F274B0
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 272304278-0
                                                                                                                                                                                                  • Opcode ID: cb927eeefb546717086f9df48e4507900540b17482ff2efb89fc884f140a728f
                                                                                                                                                                                                  • Instruction ID: 41184a9f823e7f4528cffa954610b1721e1e7c325fe531a6513fd35481da0704
                                                                                                                                                                                                  • Opcode Fuzzy Hash: cb927eeefb546717086f9df48e4507900540b17482ff2efb89fc884f140a728f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4E01A231400219EFDB10AF64DC08BF97BB5FF04321F154060F9AAA21A1CB711D41FB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00F3187F
                                                                                                                                                                                                  • UnloadUserProfile.USERENV(?,?), ref: 00F3188B
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00F31894
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00F3189C
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,?), ref: 00F318A5
                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00F318AC
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 146765662-0
                                                                                                                                                                                                  • Opcode ID: 611dd177edbddc9c858cca2bcf74306aca5996f970988b5929e0356f2e6ce7c3
                                                                                                                                                                                                  • Instruction ID: 1c0ff007bff107716fb8417eb6d2e671c113708a4aacbdbdb5300a9eafc42536
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 611dd177edbddc9c858cca2bcf74306aca5996f970988b5929e0356f2e6ce7c3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 34E0ED36004109BBDB016FA2ED0C915BF39FF4A7227108221F2F581171CBB25420FFA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED7620: _wcslen.LIBCMT ref: 00ED7625
                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F3C6EE
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F3C735
                                                                                                                                                                                                  • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00F3C79C
                                                                                                                                                                                                  • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00F3C7CA
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ItemMenu$Info_wcslen$Default
                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                  • API String ID: 1227352736-4108050209
                                                                                                                                                                                                  • Opcode ID: 727e740017e888089171c60c609a5ec87789d1539db8799057c37a4e501fca1b
                                                                                                                                                                                                  • Instruction ID: 6efe83956483c4c5e5e9c2c72376fcfb38f4c914057ceb588d64b4b1e1f8394a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 727e740017e888089171c60c609a5ec87789d1539db8799057c37a4e501fca1b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5251B072A143019BD7149F28C885B6B77E8AF89330F040A2DF995F31E1DB60DD04EBA2
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • ShellExecuteExW.SHELL32(0000003C), ref: 00F5AEA3
                                                                                                                                                                                                    • Part of subcall function 00ED7620: _wcslen.LIBCMT ref: 00ED7625
                                                                                                                                                                                                  • GetProcessId.KERNEL32(00000000), ref: 00F5AF38
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F5AF67
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                                                                                                                  • String ID: <$@
                                                                                                                                                                                                  • API String ID: 146682121-1426351568
                                                                                                                                                                                                  • Opcode ID: 0405fd057fc71ee57b304554109f2dfbda7836a1a1478dd6b96fe55cdf288478
                                                                                                                                                                                                  • Instruction ID: 296a24e099643acec392043d3cb6f8768caaa67d169ac12b2c3f8c1dfa848bd1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0405fd057fc71ee57b304554109f2dfbda7836a1a1478dd6b96fe55cdf288478
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8A71AB70A00619CFCB14DF54D485A9EBBF0FF08310F04859AE956AB3A2DB70ED46DB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00F37206
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00F3723C
                                                                                                                                                                                                  • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00F3724D
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00F372CF
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                                                                                                                  • String ID: DllGetClassObject
                                                                                                                                                                                                  • API String ID: 753597075-1075368562
                                                                                                                                                                                                  • Opcode ID: 9171a7c7b1787c981a55b6767f80eff3e3044d831018a15b40f6d8c1984b61a4
                                                                                                                                                                                                  • Instruction ID: 313bdf079ca103ed12a6610c57b60132a1287439d0d6cd9904c018582fb8b08b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9171a7c7b1787c981a55b6767f80eff3e3044d831018a15b40f6d8c1984b61a4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 49416CB1A04305EFDB25DF54C884A9B7BA9EF49320F1480A9BD059F24AD7B4D944EFA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00F63E35
                                                                                                                                                                                                  • IsMenu.USER32(?), ref: 00F63E4A
                                                                                                                                                                                                  • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00F63E92
                                                                                                                                                                                                  • DrawMenuBar.USER32 ref: 00F63EA5
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Menu$Item$DrawInfoInsert
                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                  • API String ID: 3076010158-4108050209
                                                                                                                                                                                                  • Opcode ID: da377fe7de1d1aedcf3d2fc3778d46280c59e9abc075d1231fca29c6809ee0e4
                                                                                                                                                                                                  • Instruction ID: ae9b61fc935a232cadf45fc6143c249519bcc3e541732353a9b105389d0131e2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: da377fe7de1d1aedcf3d2fc3778d46280c59e9abc075d1231fca29c6809ee0e4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E74187B5A00209AFDB10DF50D880AAABBF9FF59360F044029F941A7250D735AE08EFA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                    • Part of subcall function 00F33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F33CCA
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00F31E66
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00F31E79
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000189,?,00000000), ref: 00F31EA9
                                                                                                                                                                                                    • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$_wcslen$ClassName
                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                  • API String ID: 2081771294-1403004172
                                                                                                                                                                                                  • Opcode ID: 5d78d1bc12918e2113e5600b64f11f487c842f4316b83cad9809307c434fa040
                                                                                                                                                                                                  • Instruction ID: d5c222562c768837927344171af65b93948da4a0e2d66bc477724b446b69bfcc
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5d78d1bc12918e2113e5600b64f11f487c842f4316b83cad9809307c434fa040
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4B214771A00108BEDB14AB60DC45CFFB7F8EF41370F10411AF865A72E1DB7A5D4AA620
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen
                                                                                                                                                                                                  • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                                                                                                                                                                  • API String ID: 176396367-4004644295
                                                                                                                                                                                                  • Opcode ID: 74cc27d49a5ff17b42ae2c8b3d7d1cb9df294f25ef736dc2e37e5c829c745003
                                                                                                                                                                                                  • Instruction ID: a455511cc06421f16f369a6b05665d11d6cc8d0830fd2762066216dd350da595
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 74cc27d49a5ff17b42ae2c8b3d7d1cb9df294f25ef736dc2e37e5c829c745003
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2531C872E0036E4ECB20EE6C996017F3B919BA1761B154029EE466B245E679CD49F3D0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00F62F8D
                                                                                                                                                                                                  • LoadLibraryW.KERNEL32(?), ref: 00F62F94
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00F62FA9
                                                                                                                                                                                                  • DestroyWindow.USER32(?), ref: 00F62FB1
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                                                                                                                  • String ID: SysAnimate32
                                                                                                                                                                                                  • API String ID: 3529120543-1011021900
                                                                                                                                                                                                  • Opcode ID: 5b069315c3719b40dca26119625bf724a2a1a23d04ec72c37b5dae5c61238fdf
                                                                                                                                                                                                  • Instruction ID: 93320aa270841b595b69856333b5f478e4b8edbdd83e86e88ccab416b53aefc9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5b069315c3719b40dca26119625bf724a2a1a23d04ec72c37b5dae5c61238fdf
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4E219D71704609ABEB504FA4DC80EBB37B9EB59374F104619F950D6190D7B1DC51A7A0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00EF4D1E,00F028E9,?,00EF4CBE,00F028E9,00F988B8,0000000C,00EF4E15,00F028E9,00000002), ref: 00EF4D8D
                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00EF4DA0
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,?,00EF4D1E,00F028E9,?,00EF4CBE,00F028E9,00F988B8,0000000C,00EF4E15,00F028E9,00000002,00000000), ref: 00EF4DC3
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                  • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                  • API String ID: 4061214504-1276376045
                                                                                                                                                                                                  • Opcode ID: 23633af44d2e69675f785500f3a884cb631c6cf521e0c6fbc6b86fef358da782
                                                                                                                                                                                                  • Instruction ID: ffdcb8702833e16eb271cd3a1796a3f76b3c77b7fa2124f8814ca1a9db0bd32c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 23633af44d2e69675f785500f3a884cb631c6cf521e0c6fbc6b86fef358da782
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DFF0AF30A0020CBBDB149F90DC09BBEBBF4EF44716F0000A5F949A22A1CB719A40EBD1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00ED4EDD,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4E9C
                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00ED4EAE
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00ED4EDD,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4EC0
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                  • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                  • API String ID: 145871493-3689287502
                                                                                                                                                                                                  • Opcode ID: d5ed050f3090fedf957cbdcb7ffe44abcd8288db9e6da76615eade3e7724bf6b
                                                                                                                                                                                                  • Instruction ID: 5ed4c10bd9f3aadc5b5f8b7907a8f1dc13a19d802180af79f909242959c548cf
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d5ed050f3090fedf957cbdcb7ffe44abcd8288db9e6da76615eade3e7724bf6b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7AE08635A015226B922117256C18A7B7654EF92B667090117FC80E6241DBB0CD0250E1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00F13CDE,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4E62
                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00ED4E74
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000,?,?,00F13CDE,?,00FA1418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00ED4E87
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                  • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                  • API String ID: 145871493-1355242751
                                                                                                                                                                                                  • Opcode ID: 998bccd6e8ba0f07d0a2671a293d95d9a302c8fa757dcbb1a167a80854dedce7
                                                                                                                                                                                                  • Instruction ID: eb80d34e233b64ae3c0ef190be67be87155bae072bf050f83a0c65f6141c1d6f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 998bccd6e8ba0f07d0a2671a293d95d9a302c8fa757dcbb1a167a80854dedce7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E3D0C231502662675B221B24AC08DAB3B18EFC6B593050212FD80BA255CFB0CD02A1D0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F42C05
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?), ref: 00F42C87
                                                                                                                                                                                                  • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00F42C9D
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F42CAE
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00F42CC0
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: File$Delete$Copy
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3226157194-0
                                                                                                                                                                                                  • Opcode ID: 14dfee51bbedd8451bb63527063545442570d0453ac301d061660608652359c4
                                                                                                                                                                                                  • Instruction ID: 1a910116f2671dbb1e64733ff170afb86eb5e2605a95dd689701d52d904f8d7a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 14dfee51bbedd8451bb63527063545442570d0453ac301d061660608652359c4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2FB16E72D0011DABDF11DBA4CC85EEEBBBDEF48310F4040A6FA09E6251EA349A449F61
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetCurrentProcessId.KERNEL32 ref: 00F5A427
                                                                                                                                                                                                  • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00F5A435
                                                                                                                                                                                                  • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00F5A468
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?), ref: 00F5A63D
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3488606520-0
                                                                                                                                                                                                  • Opcode ID: 2d413ef6b56c0927eabd037991bf6c0c6854ebe2226ba491b41185b91d52837d
                                                                                                                                                                                                  • Instruction ID: 9700d1dcae2ffc8a92f43f6e46e2b97b14561103919073b2361bbb3b9c6d15d2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2d413ef6b56c0927eabd037991bf6c0c6854ebe2226ba491b41185b91d52837d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7DA18C716043019FD720DF24C886B2AB7E5EF84714F14991DFAAA9B392D7B0EC45CB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F3DDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00F3CF22,?), ref: 00F3DDFD
                                                                                                                                                                                                    • Part of subcall function 00F3DDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00F3CF22,?), ref: 00F3DE16
                                                                                                                                                                                                    • Part of subcall function 00F3E199: GetFileAttributesW.KERNEL32(?,00F3CF95), ref: 00F3E19A
                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(?,?), ref: 00F3E473
                                                                                                                                                                                                  • MoveFileW.KERNEL32(?,?), ref: 00F3E4AC
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F3E5EB
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F3E603
                                                                                                                                                                                                  • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00F3E650
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3183298772-0
                                                                                                                                                                                                  • Opcode ID: 02fca75195916f259c747a76a6697cc6167971ef3ab69c1258304e0f1565e8f4
                                                                                                                                                                                                  • Instruction ID: 476673411512ea2ee72943e626caec0e19bf878ebc94b185ace249b7c23cef7a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 02fca75195916f259c747a76a6697cc6167971ef3ab69c1258304e0f1565e8f4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 995184B25083459BC724EB90DC819EFB7ECAF84360F00491EF6C9D3191EF75A6889766
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                    • Part of subcall function 00F5C998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00F5B6AE,?,?), ref: 00F5C9B5
                                                                                                                                                                                                    • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5C9F1
                                                                                                                                                                                                    • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA68
                                                                                                                                                                                                    • Part of subcall function 00F5C998: _wcslen.LIBCMT ref: 00F5CA9E
                                                                                                                                                                                                  • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00F5BAA5
                                                                                                                                                                                                  • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00F5BB00
                                                                                                                                                                                                  • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00F5BB63
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(?,?), ref: 00F5BBA6
                                                                                                                                                                                                  • RegCloseKey.ADVAPI32(00000000), ref: 00F5BBB3
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 826366716-0
                                                                                                                                                                                                  • Opcode ID: 83296630c47b20d0cfe0169186a9a126243174858d6d92dd8a880735873db7a0
                                                                                                                                                                                                  • Instruction ID: 57ae4b7f79c5ff8aeb1773684dfd3f2423148935a2b2fe8c69ae6d25557e3293
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 83296630c47b20d0cfe0169186a9a126243174858d6d92dd8a880735873db7a0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: F061D431608241EFD314DF14C890E2ABBE5FF84318F14855DF9998B2A2DB35ED4ADB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • VariantInit.OLEAUT32(?), ref: 00F38BCD
                                                                                                                                                                                                  • VariantClear.OLEAUT32 ref: 00F38C3E
                                                                                                                                                                                                  • VariantClear.OLEAUT32 ref: 00F38C9D
                                                                                                                                                                                                  • VariantClear.OLEAUT32(?), ref: 00F38D10
                                                                                                                                                                                                  • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00F38D3B
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Variant$Clear$ChangeInitType
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4136290138-0
                                                                                                                                                                                                  • Opcode ID: ace23f4205ed1a99c295cc1d6da71c305dd5df8a643941c559c856d5faa1cd4e
                                                                                                                                                                                                  • Instruction ID: 99eac1411064a94403a897d7ac2450a8b1a0e4b2e5146c4d195d4d825357af65
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ace23f4205ed1a99c295cc1d6da71c305dd5df8a643941c559c856d5faa1cd4e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8C516BB5A00219EFCB10CF58C884AAAB7F4FF89360F158559F955DB350EB34E912CBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00F48BAE
                                                                                                                                                                                                  • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00F48BDA
                                                                                                                                                                                                  • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00F48C32
                                                                                                                                                                                                  • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00F48C57
                                                                                                                                                                                                  • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00F48C5F
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: PrivateProfile$SectionWrite$String
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2832842796-0
                                                                                                                                                                                                  • Opcode ID: da2850d8a3a27159f95a195a1455e8703b44eb2fbd7f7614a02397514641e979
                                                                                                                                                                                                  • Instruction ID: 0d25d11451f652fb5c5193a1356e51fc6b9ab8564a09a798c28d06848fbe9910
                                                                                                                                                                                                  • Opcode Fuzzy Hash: da2850d8a3a27159f95a195a1455e8703b44eb2fbd7f7614a02397514641e979
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 18515A35A002199FCB04DF65C880A6DBBF5FF48354F088459E949AB3A2DB31ED42DB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00F58F40
                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00F58FD0
                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,00000000), ref: 00F58FEC
                                                                                                                                                                                                  • GetProcAddress.KERNEL32(00000000,?), ref: 00F59032
                                                                                                                                                                                                  • FreeLibrary.KERNEL32(00000000), ref: 00F59052
                                                                                                                                                                                                    • Part of subcall function 00EEF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00F41043,?,753CE610), ref: 00EEF6E6
                                                                                                                                                                                                    • Part of subcall function 00EEF6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00F2FA64,00000000,00000000,?,?,00F41043,?,753CE610,?,00F2FA64), ref: 00EEF70D
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 666041331-0
                                                                                                                                                                                                  • Opcode ID: c6fc5d21fc27b44bd00e10dcbe4822ad00d0dba0197d43a317560b5b13b36715
                                                                                                                                                                                                  • Instruction ID: a5905f9ad04741839716697953f4e7029167cd7581caae530e5bbe07f678980e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c6fc5d21fc27b44bd00e10dcbe4822ad00d0dba0197d43a317560b5b13b36715
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A9516A35A04205DFC704DF68C4848ADBBF1FF49324B058099ED5AAB362DB31ED8ADB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00F66C33
                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000EC,?), ref: 00F66C4A
                                                                                                                                                                                                  • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00F66C73
                                                                                                                                                                                                  • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00F4AB79,00000000,00000000), ref: 00F66C98
                                                                                                                                                                                                  • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00F66CC7
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$Long$MessageSendShow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3688381893-0
                                                                                                                                                                                                  • Opcode ID: 077c02c3c8541cf6caa7884aff8e2fb299a4bd75210e293d7fabcded808f0d68
                                                                                                                                                                                                  • Instruction ID: 4b3f1f698752a0d257af493a555ce93ecaedf59962459c4dbcfd39c35b80045d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 077c02c3c8541cf6caa7884aff8e2fb299a4bd75210e293d7fabcded808f0d68
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2341B635A04504AFD724DF28CD54FB57BA5EB49361F150268F899E73E0C371AD41EA90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _free
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 269201875-0
                                                                                                                                                                                                  • Opcode ID: 653d12fa448bc2994f2fd75567d863d9f26881bd1ac31d24d0f5116ba2b019de
                                                                                                                                                                                                  • Instruction ID: 566ce212fafe736c03a264a168393b0a431d349b60e43c51a3b845686d8a19f1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 653d12fa448bc2994f2fd75567d863d9f26881bd1ac31d24d0f5116ba2b019de
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8941E232E002049FCB20DF78C884A5DB3F5EF89724F1545A9E615EB3A1DB31AD01EBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00EE9141
                                                                                                                                                                                                  • ScreenToClient.USER32(00000000,?), ref: 00EE915E
                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000001), ref: 00EE9183
                                                                                                                                                                                                  • GetAsyncKeyState.USER32(00000002), ref: 00EE919D
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AsyncState$ClientCursorScreen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4210589936-0
                                                                                                                                                                                                  • Opcode ID: b435577957284cc726dbc016fe4ef1becb48ebccd1f427c47fd9209e73449089
                                                                                                                                                                                                  • Instruction ID: 95f574c9f9ccb66becae36da2f69482328b30c8b86a28852957474e87bf83696
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b435577957284cc726dbc016fe4ef1becb48ebccd1f427c47fd9209e73449089
                                                                                                                                                                                                  • Instruction Fuzzy Hash: EA417F31A0861AFBDF09AF65D844BEEB7B4FF05324F208219E469A3291C7346950DB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetInputState.USER32 ref: 00F438CB
                                                                                                                                                                                                  • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00F43922
                                                                                                                                                                                                  • TranslateMessage.USER32(?), ref: 00F4394B
                                                                                                                                                                                                  • DispatchMessageW.USER32(?), ref: 00F43955
                                                                                                                                                                                                  • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00F43966
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2256411358-0
                                                                                                                                                                                                  • Opcode ID: 8f813a64b6c799ee9031874d7cfa646409fd243c776496caca6b76e662a7a2bd
                                                                                                                                                                                                  • Instruction ID: c1df5f1b259eb5fb9bb0e234ebaf95ffef48326934c87be2cab3fd5892d68df1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8f813a64b6c799ee9031874d7cfa646409fd243c776496caca6b76e662a7a2bd
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1D31A8B1D043499EFB35CB359C48BB77FA9BB06314F040559D8A2821A0E7F49A84FB51
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00F4C21E,00000000), ref: 00F4CF38
                                                                                                                                                                                                  • InternetReadFile.WININET(?,00000000,?,?), ref: 00F4CF6F
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000000,?,?,?,00F4C21E,00000000), ref: 00F4CFB4
                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000000,?,?,?,00F4C21E,00000000), ref: 00F4CFC8
                                                                                                                                                                                                  • SetEvent.KERNEL32(?,?,00000000,?,?,?,00F4C21E,00000000), ref: 00F4CFF2
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3191363074-0
                                                                                                                                                                                                  • Opcode ID: 634112fba6d00fda889a9e41ee812aeb6580fc776aabd9a1400d71b6b8fc38fc
                                                                                                                                                                                                  • Instruction ID: 9ea5593743f955f1cdf47d37e9263037bf83ef0a19780596a4881fd942876d6b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 634112fba6d00fda889a9e41ee812aeb6580fc776aabd9a1400d71b6b8fc38fc
                                                                                                                                                                                                  • Instruction Fuzzy Hash: DD318271901209EFDB60DFA5C884AABBFF9EB14320B10442EF956D3101D734AD44EBB0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00F31915
                                                                                                                                                                                                  • PostMessageW.USER32(00000001,00000201,00000001), ref: 00F319C1
                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,?,?), ref: 00F319C9
                                                                                                                                                                                                  • PostMessageW.USER32(00000001,00000202,00000000), ref: 00F319DA
                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00F319E2
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessagePostSleep$RectWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3382505437-0
                                                                                                                                                                                                  • Opcode ID: e32cf225bf35f94b056a654a401b9dccdba41b2f529d5089b649104c9cdac24b
                                                                                                                                                                                                  • Instruction ID: 0588a6a6a8ef255290f85b3777c878847f0f71c10aa144e904218e10bc99bd39
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e32cf225bf35f94b056a654a401b9dccdba41b2f529d5089b649104c9cdac24b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: ED31AF72900219EFCB14CFA8CD99BEE3BB5FB05325F104225F965A72D1C7B09954EB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00F65745
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001074,?,00000001), ref: 00F6579D
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F657AF
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F657BA
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F65816
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$_wcslen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 763830540-0
                                                                                                                                                                                                  • Opcode ID: 038805fea6aa689d2cb741d91a3e7d4525e99a4f315376efde44a693b4998afe
                                                                                                                                                                                                  • Instruction ID: 13b98d34078f10aa4ab0391bcf414884be055f1b7624971adbbe38244f3a3cbf
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 038805fea6aa689d2cb741d91a3e7d4525e99a4f315376efde44a693b4998afe
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 22219171D0461D9ADB20DFA0CC84AEE77B8FF04B24F108256E969FA181DBB08985DF50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • IsWindow.USER32(00000000), ref: 00F50951
                                                                                                                                                                                                  • GetForegroundWindow.USER32 ref: 00F50968
                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 00F509A4
                                                                                                                                                                                                  • GetPixel.GDI32(00000000,?,00000003), ref: 00F509B0
                                                                                                                                                                                                  • ReleaseDC.USER32(00000000,00000003), ref: 00F509E8
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$ForegroundPixelRelease
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4156661090-0
                                                                                                                                                                                                  • Opcode ID: 5447047f3c5cbf989b1a1dd89fb673e08319c0f0b79fa7c7adb315c4d6fbd41e
                                                                                                                                                                                                  • Instruction ID: f06b5c69a14cc155aefcb064eb3a1b1698c04b9cd3a81bbda0ebce4c9d210099
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5447047f3c5cbf989b1a1dd89fb673e08319c0f0b79fa7c7adb315c4d6fbd41e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 95218135600204AFD714EF65DC84AAEBBE9FF44701F048069F89AE7362DB70AC44DB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetEnvironmentStringsW.KERNEL32 ref: 00F0CDC6
                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00F0CDE9
                                                                                                                                                                                                    • Part of subcall function 00F03820: RtlAllocateHeap.NTDLL(00000000,?,00FA1444,?,00EEFDF5,?,?,00EDA976,00000010,00FA1440,00ED13FC,?,00ED13C6,?,00ED1129), ref: 00F03852
                                                                                                                                                                                                  • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00F0CE0F
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0CE22
                                                                                                                                                                                                  • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00F0CE31
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 336800556-0
                                                                                                                                                                                                  • Opcode ID: f0160a7890200416b9ba670bb1c796aa33906fc189ea24c2fc01f19b03589d44
                                                                                                                                                                                                  • Instruction ID: 049b0197a63c1f104a8d0a13a53e93bc0fcfc652b4e3aed0704c530c6aafe7ea
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f0160a7890200416b9ba670bb1c796aa33906fc189ea24c2fc01f19b03589d44
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1901D472A022157FA32127BAAC8CD7F796DDFC6BA1315022AFD05C7280EA608D01B1F0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00EE9693
                                                                                                                                                                                                  • SelectObject.GDI32(?,00000000), ref: 00EE96A2
                                                                                                                                                                                                  • BeginPath.GDI32(?), ref: 00EE96B9
                                                                                                                                                                                                  • SelectObject.GDI32(?,00000000), ref: 00EE96E2
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3225163088-0
                                                                                                                                                                                                  • Opcode ID: e2da9afddd50d29e2fd2ba92030543713313c772f1468efe0924e9e268e3d4d8
                                                                                                                                                                                                  • Instruction ID: e834fd67bb231d7ebc05e603c62d9656da12b7915afc6d8a2621b92fe534e998
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e2da9afddd50d29e2fd2ba92030543713313c772f1468efe0924e9e268e3d4d8
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 222180B080238EEBDB119F65EC147EA3BB8BB06365F110216F460A61B2D3B05995EB94
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetSysColor.USER32(00000008), ref: 00EE98CC
                                                                                                                                                                                                  • SetTextColor.GDI32(?,?), ref: 00EE98D6
                                                                                                                                                                                                  • SetBkMode.GDI32(?,00000001), ref: 00EE98E9
                                                                                                                                                                                                  • GetStockObject.GDI32(00000005), ref: 00EE98F1
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000EB), ref: 00EE9952
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Color$LongModeObjectStockTextWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1860813098-0
                                                                                                                                                                                                  • Opcode ID: 98b6492d5915add697d2f53089febf79d1e74ada42a21866184d593905be2114
                                                                                                                                                                                                  • Instruction ID: 9253d905386431f152d9874e61cf735dfaede5977c31cb1774970d8f7ea96138
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 98b6492d5915add697d2f53089febf79d1e74ada42a21866184d593905be2114
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3C1136315452D89FCB218B22EC55AFA3BA0EB53334F09015EE5E2AA1B3C6760940DB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _memcmp
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2931989736-0
                                                                                                                                                                                                  • Opcode ID: dd1e3beff65336a4d0f59764905b00466c92c0832d194b53239e64d9cd934e9a
                                                                                                                                                                                                  • Instruction ID: 532fd16d162095edb11307af17ac50357a28669189b1e656e2936efaaba74aa1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: dd1e3beff65336a4d0f59764905b00466c92c0832d194b53239e64d9cd934e9a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0001D862A4660DFBD2085510AD82FBB739D9FB1BB4F414020FE04AF241F760ED14E2E1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,?,?,00EFF2DE,00F03863,00FA1444,?,00EEFDF5,?,?,00EDA976,00000010,00FA1440,00ED13FC,?,00ED13C6), ref: 00F02DFD
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02E32
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02E59
                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,00ED1129), ref: 00F02E66
                                                                                                                                                                                                  • SetLastError.KERNEL32(00000000,00ED1129), ref: 00F02E6F
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorLast$_free
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3170660625-0
                                                                                                                                                                                                  • Opcode ID: 8513d7cb27a0ac3dd65e871e3bfb15bef64368a2e40b7d8153bc4b701923bb57
                                                                                                                                                                                                  • Instruction ID: 184b446fbd01da4a5e902e15b7dcfc07e6591f2d7377f12ea824deea8d5f08a2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8513d7cb27a0ac3dd65e871e3bfb15bef64368a2e40b7d8153bc4b701923bb57
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B701287768560467C6623735EC8EE2B366DAFD17B1B614029F865A22D2EF78CC017170
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?,?,?,00F3035E), ref: 00F3002B
                                                                                                                                                                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?,?), ref: 00F30046
                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?,?), ref: 00F30054
                                                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?), ref: 00F30064
                                                                                                                                                                                                  • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00F2FF41,80070057,?,?), ref: 00F30070
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3897988419-0
                                                                                                                                                                                                  • Opcode ID: 233af84129cd90a3a7801688742f82da774381627ffa2cc6786919df82544560
                                                                                                                                                                                                  • Instruction ID: e0a746b10509bbe1307bfdeee4d5b0a95191e6f44fa2ce0e6efb4e25f67a9289
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 233af84129cd90a3a7801688742f82da774381627ffa2cc6786919df82544560
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B901A2B2600218BFDB245F68DC44BBE7AEDEF44761F144125F985D3210DBB5DD40ABA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 00F3E997
                                                                                                                                                                                                  • QueryPerformanceFrequency.KERNEL32(?), ref: 00F3E9A5
                                                                                                                                                                                                  • Sleep.KERNEL32(00000000), ref: 00F3E9AD
                                                                                                                                                                                                  • QueryPerformanceCounter.KERNEL32(?), ref: 00F3E9B7
                                                                                                                                                                                                  • Sleep.KERNEL32 ref: 00F3E9F3
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2833360925-0
                                                                                                                                                                                                  • Opcode ID: f49720ec7fba4fa7d41a7484d1811c85f73e519a85b55a00f18f5dc1056fb5a4
                                                                                                                                                                                                  • Instruction ID: be7c05306afa43646a545ce5c30b76d3bddae01dee9eb4342272207ba7d487a7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f49720ec7fba4fa7d41a7484d1811c85f73e519a85b55a00f18f5dc1056fb5a4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D1015731C0262DDBCF00ABE5DC59BEDBB78BF0A321F000546E992B2281CB709551ABA1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00F31114
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F31120
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F3112F
                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00F30B9B,?,?,?), ref: 00F31136
                                                                                                                                                                                                  • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00F3114D
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 842720411-0
                                                                                                                                                                                                  • Opcode ID: 84efdd03a9ebf519c9472990720fe812173e5f342777285e3490c38d417016c7
                                                                                                                                                                                                  • Instruction ID: c8668d882db58eb71805bd24d05f66f4eec7898d679c2c7b8043f20100b1f969
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 84efdd03a9ebf519c9472990720fe812173e5f342777285e3490c38d417016c7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8C011D75600209BFDB115F65DC49AAA3B6EFF85370B114415FA95D7360DA71DC00AAA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00F30FCA
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00F30FD6
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00F30FE5
                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00F30FEC
                                                                                                                                                                                                  • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00F31002
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 44706859-0
                                                                                                                                                                                                  • Opcode ID: 6c2d3af0999251e010d25cf5962fbba6b497d2ba73c896b3541776c78de50d50
                                                                                                                                                                                                  • Instruction ID: b27fb2d2fff1c0987c5b9128de57c234bb0b476f9ee627bb916e289c9869d7d6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6c2d3af0999251e010d25cf5962fbba6b497d2ba73c896b3541776c78de50d50
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CEF04975600309BBDB214FA59C49F663BADFF8A762F104414FAD9D6251CAB1DC40AAA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F3102A
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F31036
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F31045
                                                                                                                                                                                                  • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F3104C
                                                                                                                                                                                                  • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F31062
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 44706859-0
                                                                                                                                                                                                  • Opcode ID: f505db8e4fa14ff44d7f2fcb9c6962d9697b6fa9c33d64707f8b5497684fd9d3
                                                                                                                                                                                                  • Instruction ID: 0a0461aca7b3fbfb535ca7a860fd53d42d266fed3f4bbf14381aca1764e520c7
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f505db8e4fa14ff44d7f2fcb9c6962d9697b6fa9c33d64707f8b5497684fd9d3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 67F06D75200309FBDB215FA5EC59F663BADFF8A771F100414FAD9D7251CAB1D840AAA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00F4017D,?,00F432FC,?,00000001,00F12592,?), ref: 00F40324
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00F4017D,?,00F432FC,?,00000001,00F12592,?), ref: 00F40331
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00F4017D,?,00F432FC,?,00000001,00F12592,?), ref: 00F4033E
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00F4017D,?,00F432FC,?,00000001,00F12592,?), ref: 00F4034B
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00F4017D,?,00F432FC,?,00000001,00F12592,?), ref: 00F40358
                                                                                                                                                                                                  • CloseHandle.KERNEL32(?,?,?,?,00F4017D,?,00F432FC,?,00000001,00F12592,?), ref: 00F40365
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseHandle
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2962429428-0
                                                                                                                                                                                                  • Opcode ID: a7b740262cfbd3b3d1b8bbc60b5dcaba4f2b1e9cdc447d375e988682e590da09
                                                                                                                                                                                                  • Instruction ID: c921a9501c774f8bbea7a3c6ebf5bd1cbd34d26dabeebd8627e365fc487852c0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a7b740262cfbd3b3d1b8bbc60b5dcaba4f2b1e9cdc447d375e988682e590da09
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4B01A272800B159FD7309F66D890422FBF5BF503253158A3FD29652931C7B1A954EF80
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0D752
                                                                                                                                                                                                    • Part of subcall function 00F029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000), ref: 00F029DE
                                                                                                                                                                                                    • Part of subcall function 00F029C8: GetLastError.KERNEL32(00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000,00000000), ref: 00F029F0
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0D764
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0D776
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0D788
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0D79A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 776569668-0
                                                                                                                                                                                                  • Opcode ID: b31ddb5fd3ca13e2131f3386700a4e0f8d2fc59d7103add2c959ebc88d99c56a
                                                                                                                                                                                                  • Instruction ID: d271168171120ace1f891cf969711c30561209c59c63018195638c5c8b583f17
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b31ddb5fd3ca13e2131f3386700a4e0f8d2fc59d7103add2c959ebc88d99c56a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E3F01232944208ABC665EBADFDC5C167BEDBB447207E40806F048E7581C734FC80B6B4
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDlgItem.USER32(?,000003E9), ref: 00F35C58
                                                                                                                                                                                                  • GetWindowTextW.USER32(00000000,?,00000100), ref: 00F35C6F
                                                                                                                                                                                                  • MessageBeep.USER32(00000000), ref: 00F35C87
                                                                                                                                                                                                  • KillTimer.USER32(?,0000040A), ref: 00F35CA3
                                                                                                                                                                                                  • EndDialog.USER32(?,00000001), ref: 00F35CBD
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3741023627-0
                                                                                                                                                                                                  • Opcode ID: 45ee75563f9c04437155c5c270b1bb4624aafb4f391c7f4c069b29d9bf967c42
                                                                                                                                                                                                  • Instruction ID: d1b457d5c0639bf708f27b9f68d113cc80469c6c57eea428977168a004a9451a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 45ee75563f9c04437155c5c270b1bb4624aafb4f391c7f4c069b29d9bf967c42
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A401D630500B08ABEB205B20DD4EFA677B8FB00F59F00115AE1D3A14E0DBF1A984EA90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F022BE
                                                                                                                                                                                                    • Part of subcall function 00F029C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000), ref: 00F029DE
                                                                                                                                                                                                    • Part of subcall function 00F029C8: GetLastError.KERNEL32(00000000,?,00F0D7D1,00000000,00000000,00000000,00000000,?,00F0D7F8,00000000,00000007,00000000,?,00F0DBF5,00000000,00000000), ref: 00F029F0
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F022D0
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F022E3
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F022F4
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F02305
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 776569668-0
                                                                                                                                                                                                  • Opcode ID: d51ae1162c5df162b3fd8ed4891360da54494411d03768e8c6bde801fc91edd0
                                                                                                                                                                                                  • Instruction ID: 27302a197005ae603480d13295af77566918577ba91f133bb5a85979d85119a1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d51ae1162c5df162b3fd8ed4891360da54494411d03768e8c6bde801fc91edd0
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6DF03AB48101288FCA52BF58BC059493BA4F75A760B91050BF410E32F1CB344811BBF4
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • EndPath.GDI32(?), ref: 00EE95D4
                                                                                                                                                                                                  • StrokeAndFillPath.GDI32(?,?,00F271F7,00000000,?,?,?), ref: 00EE95F0
                                                                                                                                                                                                  • SelectObject.GDI32(?,00000000), ref: 00EE9603
                                                                                                                                                                                                  • DeleteObject.GDI32 ref: 00EE9616
                                                                                                                                                                                                  • StrokePath.GDI32(?), ref: 00EE9631
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2625713937-0
                                                                                                                                                                                                  • Opcode ID: bbacf0786b6e94586c82a5fd221aee790d2f29cd4a14cb2704e82d5a334ca868
                                                                                                                                                                                                  • Instruction ID: 5a49c492e8fb3781c0442c67d8400ac4ac235834e1c50d65a785e74b028201d5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: bbacf0786b6e94586c82a5fd221aee790d2f29cd4a14cb2704e82d5a334ca868
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 41F0877000624CEBCB225F2AED1CBB63BA0BB0A366F008215F4B5A50F1C7708995EF60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: __freea$_free
                                                                                                                                                                                                  • String ID: a/p$am/pm
                                                                                                                                                                                                  • API String ID: 3432400110-3206640213
                                                                                                                                                                                                  • Opcode ID: 364dba271ddc865a8e9ca4d9f7c90abe1aeb0aa4a0710e78510f4119e06e5034
                                                                                                                                                                                                  • Instruction ID: 0faff6c551cc19507cf3301cdc6e0836a77b8369e3f2b479b304d6a0e13d93ac
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 364dba271ddc865a8e9ca4d9f7c90abe1aeb0aa4a0710e78510f4119e06e5034
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BAD11432E00206DADB289F68C895BFEB7B5FF05320F284159E941AB6D0D3759D80FB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00EF0242: EnterCriticalSection.KERNEL32(00FA070C,00FA1884,?,?,00EE198B,00FA2518,?,?,?,00ED12F9,00000000), ref: 00EF024D
                                                                                                                                                                                                    • Part of subcall function 00EF0242: LeaveCriticalSection.KERNEL32(00FA070C,?,00EE198B,00FA2518,?,?,?,00ED12F9,00000000), ref: 00EF028A
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                    • Part of subcall function 00EF00A3: __onexit.LIBCMT ref: 00EF00A9
                                                                                                                                                                                                  • __Init_thread_footer.LIBCMT ref: 00F57BFB
                                                                                                                                                                                                    • Part of subcall function 00EF01F8: EnterCriticalSection.KERNEL32(00FA070C,?,?,00EE8747,00FA2514), ref: 00EF0202
                                                                                                                                                                                                    • Part of subcall function 00EF01F8: LeaveCriticalSection.KERNEL32(00FA070C,?,00EE8747,00FA2514), ref: 00EF0235
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                                                                                                                                  • String ID: 5$G$Variable must be of type 'Object'.
                                                                                                                                                                                                  • API String ID: 535116098-3733170431
                                                                                                                                                                                                  • Opcode ID: 48aed98eb708cac4b269a873e181e3bbcfe550977dc51bbe4f6c44c0305eb13f
                                                                                                                                                                                                  • Instruction ID: 9364032f943da570bcb040b09c42bf3ed38340bbc01d5d5271ff304d3883af44
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 48aed98eb708cac4b269a873e181e3bbcfe550977dc51bbe4f6c44c0305eb13f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E3919970A04209AFCB04EF54E8959BDB7B1FF49311F148059FE06AB292DB31AE49EB51
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID: JO
                                                                                                                                                                                                  • API String ID: 0-1663374661
                                                                                                                                                                                                  • Opcode ID: 4996a497921dc3bef1af490a91f6f6028fabeb8bab3d59e44f69554e6b410651
                                                                                                                                                                                                  • Instruction ID: 6aa7254ad2d24a8a183b16c42d80a18d19ed664b2e1ed3a192e461e1f06b519e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 4996a497921dc3bef1af490a91f6f6028fabeb8bab3d59e44f69554e6b410651
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7F51BEB1E006099FEB219FB4C845BBFBBB8AF45B20F14405AF405A72E1D6B59901FF61
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00F08B6E
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00F08B7A
                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00F08B81
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                                                                                                                                                                  • String ID: .
                                                                                                                                                                                                  • API String ID: 2434981716-3963672497
                                                                                                                                                                                                  • Opcode ID: 78d90aa5cbf36cb1da0b577ad4241a827d6aa0c427db8a153bb4dff4d11bdde6
                                                                                                                                                                                                  • Instruction ID: 3235d9564bd05f3ae5dee89cb868f8da378b80843707a8f7d8aafa58655a3aee
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 78d90aa5cbf36cb1da0b577ad4241a827d6aa0c427db8a153bb4dff4d11bdde6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E3417BF1A04159AFDB249F24CC80A797FA6DFC6390F2881A9F4C597692DE318C03B790
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F3B403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F321D0,?,?,00000034,00000800,?,00000034), ref: 00F3B42D
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00F32760
                                                                                                                                                                                                    • Part of subcall function 00F3B3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00F321FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00F3B3F8
                                                                                                                                                                                                    • Part of subcall function 00F3B32A: GetWindowThreadProcessId.USER32(?,?), ref: 00F3B355
                                                                                                                                                                                                    • Part of subcall function 00F3B32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00F32194,00000034,?,?,00001004,00000000,00000000), ref: 00F3B365
                                                                                                                                                                                                    • Part of subcall function 00F3B32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00F32194,00000034,?,?,00001004,00000000,00000000), ref: 00F3B37B
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F327CD
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00F3281A
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                                                                                                  • String ID: @
                                                                                                                                                                                                  • API String ID: 4150878124-2766056989
                                                                                                                                                                                                  • Opcode ID: 3fe30c7df815f6941af91f3db5db4b647d5c6c10998a7d68bb124f114badf884
                                                                                                                                                                                                  • Instruction ID: f7e9378caa742e54a48f9a01b3210fe10fcb420b8736a14e063d6f7049dbb595
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3fe30c7df815f6941af91f3db5db4b647d5c6c10998a7d68bb124f114badf884
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CB413972900218BFDB10DFA4CD95AEEBBB8EF09710F104099FA95B7181DB716E45DBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00F01769
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F01834
                                                                                                                                                                                                  • _free.LIBCMT ref: 00F0183E
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _free$FileModuleName
                                                                                                                                                                                                  • String ID: C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                  • API String ID: 2506810119-1957095476
                                                                                                                                                                                                  • Opcode ID: 188e93b5526dc79b2d56bf5d7ec97337b8b96ac3b4920169b4bd076acda8d290
                                                                                                                                                                                                  • Instruction ID: b96e24d3b5242b07a549ec0fd2694671486083ed916e6f25dcdbe627224eedd8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 188e93b5526dc79b2d56bf5d7ec97337b8b96ac3b4920169b4bd076acda8d290
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4A314F75E40218EBDB21DF999C85E9EBBFCFB85360F144166F50497291D6708E40FBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00F3C306
                                                                                                                                                                                                  • DeleteMenu.USER32(?,00000007,00000000), ref: 00F3C34C
                                                                                                                                                                                                  • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00FA1990,015C61C0), ref: 00F3C395
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Menu$Delete$InfoItem
                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                  • API String ID: 135850232-4108050209
                                                                                                                                                                                                  • Opcode ID: c764c664c3dbe82a7f7316a5786499ac076597ea3ec636fb5d8638ab47115157
                                                                                                                                                                                                  • Instruction ID: 236da25ec2eaad0823e019c3a9b6fdda276fba457f0afa4d1594e16380444ead
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c764c664c3dbe82a7f7316a5786499ac076597ea3ec636fb5d8638ab47115157
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 02418E726043019FD720DF25DC84B6ABBE4EF85330F148A1EF9A5A7291D774E904EB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00F6CC08,00000000,?,?,?,?), ref: 00F644AA
                                                                                                                                                                                                  • GetWindowLongW.USER32 ref: 00F644C7
                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F644D7
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$Long
                                                                                                                                                                                                  • String ID: SysTreeView32
                                                                                                                                                                                                  • API String ID: 847901565-1698111956
                                                                                                                                                                                                  • Opcode ID: 51ddb404c6b0e38af45f17c5539c71651fd2d2c987a16e2b90bd7f71fc5eba80
                                                                                                                                                                                                  • Instruction ID: 20e1bef4c8dd1355e761947ac78f189387ba6b854f30d93ecc88b456b38a41fd
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 51ddb404c6b0e38af45f17c5539c71651fd2d2c987a16e2b90bd7f71fc5eba80
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BD31B031610209AFDF21AE38DC46BEA7BA9EB09334F244315F975A31D1DB70EC51AB50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F5335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00F53077,?,?), ref: 00F53378
                                                                                                                                                                                                  • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00F5307A
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F5309B
                                                                                                                                                                                                  • htons.WSOCK32(00000000,?,?,00000000), ref: 00F53106
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                                                                                                                  • String ID: 255.255.255.255
                                                                                                                                                                                                  • API String ID: 946324512-2422070025
                                                                                                                                                                                                  • Opcode ID: eb700ab867491b09eb047365a4c506948f56da77fa839b6e34b7f44b0f6c378b
                                                                                                                                                                                                  • Instruction ID: fb66b09c8d748b104fc79a38832f076b92487c09bde2329b0c3c9f9a405eb2b0
                                                                                                                                                                                                  • Opcode Fuzzy Hash: eb700ab867491b09eb047365a4c506948f56da77fa839b6e34b7f44b0f6c378b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8C31B436A042059FC710CF2CC485A6A77E0EF54369F248059EA158B392D771DE49E760
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00F63F40
                                                                                                                                                                                                  • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00F63F54
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F63F78
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$Window
                                                                                                                                                                                                  • String ID: SysMonthCal32
                                                                                                                                                                                                  • API String ID: 2326795674-1439706946
                                                                                                                                                                                                  • Opcode ID: 44a7db8af1fa964d6f7e3f27ab200981c0ad97c784b0a850d0ae371391a14fba
                                                                                                                                                                                                  • Instruction ID: faf7e81cf6be6fffb4a0df5d9998fe2658e37a406b1fb89ca1e92268279c54c3
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 44a7db8af1fa964d6f7e3f27ab200981c0ad97c784b0a850d0ae371391a14fba
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9321D132A00219BFDF259F50CC46FEA3BB9EF48724F110214FA556B1D0D6B6AC50EBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00F64705
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00F64713
                                                                                                                                                                                                  • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00F6471A
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$DestroyWindow
                                                                                                                                                                                                  • String ID: msctls_updown32
                                                                                                                                                                                                  • API String ID: 4014797782-2298589950
                                                                                                                                                                                                  • Opcode ID: a155ba941ca4b0720ce9c615ee9b165989057eb428393b6aa329c7c4c3abbf98
                                                                                                                                                                                                  • Instruction ID: 0cf4b129653f79541fdef176dc9435b566d79643f73929d8135b68f9f05c60b6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a155ba941ca4b0720ce9c615ee9b165989057eb428393b6aa329c7c4c3abbf98
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1A215EB5600209AFEB10EF64DC91DB737ADEB5A3A4B140059FA109B261CB71FC51EA60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen
                                                                                                                                                                                                  • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                                                                                                                  • API String ID: 176396367-2734436370
                                                                                                                                                                                                  • Opcode ID: a5b8b331a28e44e086009be02aef357f82b24f9c6dc25f4f14bcdf46b0e216b2
                                                                                                                                                                                                  • Instruction ID: cc64befd0d9e64455cc3065337bf7101544972d00a176b8d1416151dc9a9a2e8
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a5b8b331a28e44e086009be02aef357f82b24f9c6dc25f4f14bcdf46b0e216b2
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C1215B7260961166C331AB24DC03FB773D8DF91330F544026F95AA7181EBD1ED85E2A5
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00F63840
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00F63850
                                                                                                                                                                                                  • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00F63876
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend$MoveWindow
                                                                                                                                                                                                  • String ID: Listbox
                                                                                                                                                                                                  • API String ID: 3315199576-2633736733
                                                                                                                                                                                                  • Opcode ID: 7fc049697bb6234174a8540ed459789052a572b6efa83c86bfbc8a9af5ae9619
                                                                                                                                                                                                  • Instruction ID: b2b0c70c5a8d3f882a3ec13e0e17e735380cf8533edfefa96c1b861da5fd534a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7fc049697bb6234174a8540ed459789052a572b6efa83c86bfbc8a9af5ae9619
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0121C272A14218BBEF219F64CC41FFB376EEF89760F118114F9549B190C6B5DC52A7A0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000001), ref: 00F44A08
                                                                                                                                                                                                  • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00F44A5C
                                                                                                                                                                                                  • SetErrorMode.KERNEL32(00000000,?,?,00F6CC08), ref: 00F44AD0
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorMode$InformationVolume
                                                                                                                                                                                                  • String ID: %lu
                                                                                                                                                                                                  • API String ID: 2507767853-685833217
                                                                                                                                                                                                  • Opcode ID: 95dd04694e7b9f80abcea86c082543d4a453669fe2d0c947f0c4b44c1b1f81bc
                                                                                                                                                                                                  • Instruction ID: e1c2093bbf18cd0b5cceb5d2e766a71a4797697c42e35533630a6606ae9f82fb
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 95dd04694e7b9f80abcea86c082543d4a453669fe2d0c947f0c4b44c1b1f81bc
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AD31A571A00108AFDB10DF54C885EAA7BF8EF04308F144095F945EB352DB75ED46DBA1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00F6424F
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00F64264
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00F64271
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                  • String ID: msctls_trackbar32
                                                                                                                                                                                                  • API String ID: 3850602802-1010561917
                                                                                                                                                                                                  • Opcode ID: f6b984332b754dbe30149b668aaca3316ff278716418269edecb82d56327b93b
                                                                                                                                                                                                  • Instruction ID: a709cb87ded78dd46a6c2c5e6d1541a5c2801517207e73bd26870628675ba511
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f6b984332b754dbe30149b668aaca3316ff278716418269edecb82d56327b93b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3B110631640208BEEF206F28CC46FAB3BACEF85B64F110114FA55E2090D2B1EC51AB14
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED6B57: _wcslen.LIBCMT ref: 00ED6B6A
                                                                                                                                                                                                    • Part of subcall function 00F32DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00F32DC5
                                                                                                                                                                                                    • Part of subcall function 00F32DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F32DD6
                                                                                                                                                                                                    • Part of subcall function 00F32DA7: GetCurrentThreadId.KERNEL32 ref: 00F32DDD
                                                                                                                                                                                                    • Part of subcall function 00F32DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00F32DE4
                                                                                                                                                                                                  • GetFocus.USER32 ref: 00F32F78
                                                                                                                                                                                                    • Part of subcall function 00F32DEE: GetParent.USER32(00000000), ref: 00F32DF9
                                                                                                                                                                                                  • GetClassNameW.USER32(?,?,00000100), ref: 00F32FC3
                                                                                                                                                                                                  • EnumChildWindows.USER32(?,00F3303B), ref: 00F32FEB
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                                                                                                                  • String ID: %s%d
                                                                                                                                                                                                  • API String ID: 1272988791-1110647743
                                                                                                                                                                                                  • Opcode ID: a77c8ed2eedee6d9c287d173406ab5fb361413f875210495ee7022050f6f0d62
                                                                                                                                                                                                  • Instruction ID: d65d4b3e80add4dc086f7278713f798de72203d2ff8d27e551a6445f4e6fd37a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a77c8ed2eedee6d9c287d173406ab5fb361413f875210495ee7022050f6f0d62
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7B11E4B16002096BCF44BF70CC85EFD37AAEF84328F044076F909AB252DE759905AB70
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00F658C1
                                                                                                                                                                                                  • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00F658EE
                                                                                                                                                                                                  • DrawMenuBar.USER32(?), ref: 00F658FD
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Menu$InfoItem$Draw
                                                                                                                                                                                                  • String ID: 0
                                                                                                                                                                                                  • API String ID: 3227129158-4108050209
                                                                                                                                                                                                  • Opcode ID: f29df87128e308656cd2c1ae21e102951663447418b979c6e343e20ad6395502
                                                                                                                                                                                                  • Instruction ID: 8b6123fb96051a5560d028b6b3fcf54c30aac2bc564031782a99f8b569f68c1c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f29df87128e308656cd2c1ae21e102951663447418b979c6e343e20ad6395502
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B0016D32500258EFDB219F11DC44BAEBBB4FB45760F148099E889E6161DB709A84EF71
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 00F2D3BF
                                                                                                                                                                                                  • FreeLibrary.KERNEL32 ref: 00F2D3E5
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: AddressFreeLibraryProc
                                                                                                                                                                                                  • String ID: GetSystemWow64DirectoryW$X64
                                                                                                                                                                                                  • API String ID: 3013587201-2590602151
                                                                                                                                                                                                  • Opcode ID: c0a612ef2cd7a8c0ed98b32438e48860cbd89131db4c3808d94e95b1bb591760
                                                                                                                                                                                                  • Instruction ID: a5b8be9d8a9e9595c2e776bdaa97a2580738f12d0238c4fae080ff03dd924be9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c0a612ef2cd7a8c0ed98b32438e48860cbd89131db4c3808d94e95b1bb591760
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 63F0AB32C06B79CBDB3152109C04BB93310AF12B24F698255F8D1F60C6D760CC40B2D2
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: eeb4df76fe7cf24666e2adca57bcde4faa175fd304abe40900b804ee6dac075b
                                                                                                                                                                                                  • Instruction ID: 83607331651af34ddc43aa45bdea48000cad540dcb4d78f2b0d0310d12caf3e3
                                                                                                                                                                                                  • Opcode Fuzzy Hash: eeb4df76fe7cf24666e2adca57bcde4faa175fd304abe40900b804ee6dac075b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 96C14A75A0020AEFDB14CF94C8A4BAEB7B5FF48724F108599E505EB251DB31DD41DB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Variant$ClearInitInitializeUninitialize
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1998397398-0
                                                                                                                                                                                                  • Opcode ID: fe886f9ec11def1d41d87af9e7627049b19cc39d06d7aa2c8bb414d8d3aa059f
                                                                                                                                                                                                  • Instruction ID: f353d9608745b38abbba5183fd1ba41fdbb1eecd78d899125026864d40c79780
                                                                                                                                                                                                  • Opcode Fuzzy Hash: fe886f9ec11def1d41d87af9e7627049b19cc39d06d7aa2c8bb414d8d3aa059f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6CA13C756042019FC710DF28C485A2AB7E5FF88765F04895DFD89AB362DB30ED05DB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00F6FC08,?), ref: 00F305F0
                                                                                                                                                                                                  • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00F6FC08,?), ref: 00F30608
                                                                                                                                                                                                  • CLSIDFromProgID.OLE32(?,?,00000000,00F6CC40,000000FF,?,00000000,00000800,00000000,?,00F6FC08,?), ref: 00F3062D
                                                                                                                                                                                                  • _memcmp.LIBVCRUNTIME ref: 00F3064E
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FromProg$FreeTask_memcmp
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 314563124-0
                                                                                                                                                                                                  • Opcode ID: 625a86e538e6dd9b9e84cebf1b1ca4e1447c45c737d00844876e8bcf02be4c5c
                                                                                                                                                                                                  • Instruction ID: a34429301b79f20d51985ae25d63fb009012de91575494630968a40cf917e7e6
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 625a86e538e6dd9b9e84cebf1b1ca4e1447c45c737d00844876e8bcf02be4c5c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 72814971A00109EFCB04DF94C994EEEB7B9FF89325F204199F506AB250DB71AE06DB60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateToolhelp32Snapshot.KERNEL32 ref: 00F5A6AC
                                                                                                                                                                                                  • Process32FirstW.KERNEL32(00000000,?), ref: 00F5A6BA
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                  • Process32NextW.KERNEL32(00000000,?), ref: 00F5A79C
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000), ref: 00F5A7AB
                                                                                                                                                                                                    • Part of subcall function 00EECE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00F13303,?), ref: 00EECE8A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1991900642-0
                                                                                                                                                                                                  • Opcode ID: 0b88ac143e2f0054fd3f12902be562892592f5c827a1d4ef6a12e8a67945b49a
                                                                                                                                                                                                  • Instruction ID: f29f70bcc802036fa13ebbd92d43b55186f56b6ed013b806deb453a2fd620d6e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 0b88ac143e2f0054fd3f12902be562892592f5c827a1d4ef6a12e8a67945b49a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D5517E715083009FD310EF24D886A6BBBE8FF89754F00591EF995A73A2EB70D905CB92
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _free
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 269201875-0
                                                                                                                                                                                                  • Opcode ID: 5965ff45cdcc59869cd37bc239d17d2697ba0b5e95995c3e2f058cef70ba3aee
                                                                                                                                                                                                  • Instruction ID: 55579390c4a7eddfd70dcd80225ebe7ad4c179f5f3714fa5c4443b5e726b18e2
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5965ff45cdcc59869cd37bc239d17d2697ba0b5e95995c3e2f058cef70ba3aee
                                                                                                                                                                                                  • Instruction Fuzzy Hash: A1413C31A001046BEB25EFF99C456FE3AE5FF42B70F144225F619D61E2E67448817261
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00F662E2
                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00F66315
                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00F66382
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$ClientMoveRectScreen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3880355969-0
                                                                                                                                                                                                  • Opcode ID: 8ab223cf92d189da12a3c8b6b960fbc389069203ff740c0a48285ca1eaa056ee
                                                                                                                                                                                                  • Instruction ID: 27e1d34969f8c7a9b32b9b5176fa3048c1b7f5b3ac218404330d1e0be089ab4c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8ab223cf92d189da12a3c8b6b960fbc389069203ff740c0a48285ca1eaa056ee
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 87511A74A00209AFDF10DF68D8819AE7BB5FB45364F10826AF865DB390D730AD81EB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • socket.WSOCK32(00000002,00000002,00000011), ref: 00F51AFD
                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00F51B0B
                                                                                                                                                                                                  • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00F51B8A
                                                                                                                                                                                                  • WSAGetLastError.WSOCK32 ref: 00F51B94
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorLast$socket
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1881357543-0
                                                                                                                                                                                                  • Opcode ID: 08e7ec120909e92120dd95d8b8e692f3e1a2e01f17638ec746f2d934e25fd263
                                                                                                                                                                                                  • Instruction ID: c3ffce09a7efde085f07059e4f68128cdfa73d0b70a3932be6756b2514ea7de9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 08e7ec120909e92120dd95d8b8e692f3e1a2e01f17638ec746f2d934e25fd263
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D941C6346002006FD720AF24C886F2577E5EB84718F549449FA559F3D3D772ED42CB90
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: c77036411ffc81d9af677faf6efc7d494bb7c6843010f150263c173b47c41cfa
                                                                                                                                                                                                  • Instruction ID: 6532b74804febcfb170ce0a3526d662562d68a2ac7496fc22b79756c8f41e581
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c77036411ffc81d9af677faf6efc7d494bb7c6843010f150263c173b47c41cfa
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 72412B76A00304AFD724DF78CC41BAABBE9EF88720F10466AF541DB2D1D3759A41A790
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00F45783
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00000000), ref: 00F457A9
                                                                                                                                                                                                  • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00F457CE
                                                                                                                                                                                                  • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00F457FA
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3321077145-0
                                                                                                                                                                                                  • Opcode ID: 29ccab4c9ec5feb4980bc77bdff58a9e4838534bcc7af37880cb23665538d2cd
                                                                                                                                                                                                  • Instruction ID: 880a16e7d23d69143c1b48fe06319757000fde13ad256c9d1c1dd3a36b4e2927
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 29ccab4c9ec5feb4980bc77bdff58a9e4838534bcc7af37880cb23665538d2cd
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3C414E35600611DFCB11EF15C444A5EBBF2EF89720B198489EC8AAB3A2DB34FD01DB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00EF82D9,?,00EF82D9,?,00000001,?,?,00000001,00EF82D9,00EF82D9), ref: 00F0D910
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F0D999
                                                                                                                                                                                                  • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00F0D9AB
                                                                                                                                                                                                  • __freea.LIBCMT ref: 00F0D9B4
                                                                                                                                                                                                    • Part of subcall function 00F03820: RtlAllocateHeap.NTDLL(00000000,?,00FA1444,?,00EEFDF5,?,?,00EDA976,00000010,00FA1440,00ED13FC,?,00ED13C6,?,00ED1129), ref: 00F03852
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2652629310-0
                                                                                                                                                                                                  • Opcode ID: 1b8ea2ab95a27dc6744cecb3556cc6714702540cbdabf8135bff738f301807e5
                                                                                                                                                                                                  • Instruction ID: 127c2aa172626f32ecd4811521fcfc8883a4e89c4a036d2845b038b4c5c7e540
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1b8ea2ab95a27dc6744cecb3556cc6714702540cbdabf8135bff738f301807e5
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8631CF72A0120AABDF24DFA4DC41EBE7BA5EB41720F054168FC14D7290EB35CD50EBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001024,00000000,?), ref: 00F65352
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00F65375
                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00F65382
                                                                                                                                                                                                  • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00F653A8
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: LongWindow$InvalidateMessageRectSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3340791633-0
                                                                                                                                                                                                  • Opcode ID: c0759b303eb78fee9d966e085c4a55db8b7bd22df617b6b0dbbadfef24344a3d
                                                                                                                                                                                                  • Instruction ID: 2f6e2ea3937998085d28b217602280020e8da6cba3eafa2d733b143e0c62510a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: c0759b303eb78fee9d966e085c4a55db8b7bd22df617b6b0dbbadfef24344a3d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7331B235E55A0CAFEB309E54CC17BE93767AB05FA0F584102FA51A63E1C7B19940BB41
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00F3ABF1
                                                                                                                                                                                                  • SetKeyboardState.USER32(00000080,?,00008000), ref: 00F3AC0D
                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000101,00000000), ref: 00F3AC74
                                                                                                                                                                                                  • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00F3ACC6
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 432972143-0
                                                                                                                                                                                                  • Opcode ID: 6f36e699a7e97e8f7b1797c02ed17e419f024c23406ddfe32cc6bb2b43c9cbee
                                                                                                                                                                                                  • Instruction ID: 7519de0f15c5aadfdf3754af8afdf3dc18b3cf3c3114fc98275df964f95b19b5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6f36e699a7e97e8f7b1797c02ed17e419f024c23406ddfe32cc6bb2b43c9cbee
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B2311631E04618AFEB258B66CC087FE7BA5AB45370F08621AE4D5521D1C3B9CD81A792
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • ClientToScreen.USER32(?,?), ref: 00F6769A
                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00F67710
                                                                                                                                                                                                  • PtInRect.USER32(?,?,00F68B89), ref: 00F67720
                                                                                                                                                                                                  • MessageBeep.USER32(00000000), ref: 00F6778C
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1352109105-0
                                                                                                                                                                                                  • Opcode ID: 591907b7fa9b080304c9a6ce455cffaa00d5e7314641c00fb8057650e4181bca
                                                                                                                                                                                                  • Instruction ID: 9572cc73d35879157d37b2f61e2599cd3a67e253bdb1ba22c34d59c94ccac70b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 591907b7fa9b080304c9a6ce455cffaa00d5e7314641c00fb8057650e4181bca
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 4C41AE74A05318DFDB01EF58C894EA9BBF4FF49318F1980A8E4549B261D731E941EF90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetForegroundWindow.USER32 ref: 00F616EB
                                                                                                                                                                                                    • Part of subcall function 00F33A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00F33A57
                                                                                                                                                                                                    • Part of subcall function 00F33A3D: GetCurrentThreadId.KERNEL32 ref: 00F33A5E
                                                                                                                                                                                                    • Part of subcall function 00F33A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00F325B3), ref: 00F33A65
                                                                                                                                                                                                  • GetCaretPos.USER32(?), ref: 00F616FF
                                                                                                                                                                                                  • ClientToScreen.USER32(00000000,?), ref: 00F6174C
                                                                                                                                                                                                  • GetForegroundWindow.USER32 ref: 00F61752
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2759813231-0
                                                                                                                                                                                                  • Opcode ID: 5b4e1605f73033b24b88e4e0355e6a54051fa5f7ee13e9e9416359c7bfe16b2d
                                                                                                                                                                                                  • Instruction ID: 8a4879d2c02a12d349b2488ceb852476078c6d98fa00bc7a77487bdb89c9d901
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5b4e1605f73033b24b88e4e0355e6a54051fa5f7ee13e9e9416359c7bfe16b2d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 80314175D00149AFCB00DFA9C881CAEBBF9FF48314B5480AAE455E7311E7359E45DBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED7620: _wcslen.LIBCMT ref: 00ED7625
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F3DFCB
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F3DFE2
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F3E00D
                                                                                                                                                                                                  • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00F3E018
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen$ExtentPoint32Text
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3763101759-0
                                                                                                                                                                                                  • Opcode ID: ca6d11e1100d788601707cdbf3f10de9ec5944325fd84dfe39f2ead345a27679
                                                                                                                                                                                                  • Instruction ID: 79b5562b2efd914bef37c5017cab3219d99e316f01f8b6814bc94b25029af30c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ca6d11e1100d788601707cdbf3f10de9ec5944325fd84dfe39f2ead345a27679
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7A2183B1D00218EFCB109FA8D981B7EBBF8EF85760F144065E905BB285D6B09E419BA1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00F69001
                                                                                                                                                                                                  • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00F27711,?,?,?,?,?), ref: 00F69016
                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00F6905E
                                                                                                                                                                                                  • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00F27711,?,?,?), ref: 00F69094
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2864067406-0
                                                                                                                                                                                                  • Opcode ID: 681eae63e107b23aac96ca783912ed597626e5ff35764e578e007fa4b0608b33
                                                                                                                                                                                                  • Instruction ID: 9de0182905097d6c07944be93588aaf888712c29bdda171b0f10073b039f6054
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 681eae63e107b23aac96ca783912ed597626e5ff35764e578e007fa4b0608b33
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B5218D35A05018BFDF258FA4CC58EFA7BB9FB8A360F144059F9455B261C3B19D50EBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetFileAttributesW.KERNEL32(?,00F6CB68), ref: 00F3D2FB
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00F3D30A
                                                                                                                                                                                                  • CreateDirectoryW.KERNEL32(?,00000000), ref: 00F3D319
                                                                                                                                                                                                  • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00F6CB68), ref: 00F3D376
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2267087916-0
                                                                                                                                                                                                  • Opcode ID: f7bbabea9ed49a33cae4feca6eaa5fbae0c59ca194f2441a601d2bcb1f690aa8
                                                                                                                                                                                                  • Instruction ID: d19d7f0f28f4eafb17b2b69428e3e4e08c6cb7f884d8aee34083ca7861092254
                                                                                                                                                                                                  • Opcode Fuzzy Hash: f7bbabea9ed49a33cae4feca6eaa5fbae0c59ca194f2441a601d2bcb1f690aa8
                                                                                                                                                                                                  • Instruction Fuzzy Hash: EF21A170909201DF8300DF28E88196A77E4EE56778F104A1EF4E9D72A1D731DD4AEB93
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F31014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00F3102A
                                                                                                                                                                                                    • Part of subcall function 00F31014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00F31036
                                                                                                                                                                                                    • Part of subcall function 00F31014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F31045
                                                                                                                                                                                                    • Part of subcall function 00F31014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00F3104C
                                                                                                                                                                                                    • Part of subcall function 00F31014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00F31062
                                                                                                                                                                                                  • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00F315BE
                                                                                                                                                                                                  • _memcmp.LIBVCRUNTIME ref: 00F315E1
                                                                                                                                                                                                  • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00F31617
                                                                                                                                                                                                  • HeapFree.KERNEL32(00000000), ref: 00F3161E
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1592001646-0
                                                                                                                                                                                                  • Opcode ID: 628f586d9b7bf64c0819d2b18ad7fc94a3131ad687ec71891962ca55e89181d5
                                                                                                                                                                                                  • Instruction ID: ebd022b60999c038c9023e7c8d7846bf924b24be48a1f53f6e86601fa8250c80
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 628f586d9b7bf64c0819d2b18ad7fc94a3131ad687ec71891962ca55e89181d5
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0E21AC71E00109EFEF10DFA5C945BEEB7B8FF44364F098469E451AB241E770AA05EBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000EC), ref: 00F6280A
                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00F62824
                                                                                                                                                                                                  • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00F62832
                                                                                                                                                                                                  • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00F62840
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$Long$AttributesLayered
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2169480361-0
                                                                                                                                                                                                  • Opcode ID: 1338c9346d10490f78dd36443f5a0c4309b7c9b77fdb3b89888eda4b48469a70
                                                                                                                                                                                                  • Instruction ID: 016c3b0784d3a3a4ab5b8cd5263cf5059f942e131c3fe5ad76d1ef1536b96e27
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1338c9346d10490f78dd36443f5a0c4309b7c9b77fdb3b89888eda4b48469a70
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 51212F31304911AFD7109B24CC40FAA7B99EF85324F188209F4668B2E2CBB5FC82DBD0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00F38D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00F3790A,?,000000FF,?,00F38754,00000000,?,0000001C,?,?), ref: 00F38D8C
                                                                                                                                                                                                    • Part of subcall function 00F38D7D: lstrcpyW.KERNEL32(00000000,?,?,00F3790A,?,000000FF,?,00F38754,00000000,?,0000001C,?,?,00000000), ref: 00F38DB2
                                                                                                                                                                                                    • Part of subcall function 00F38D7D: lstrcmpiW.KERNEL32(00000000,?,00F3790A,?,000000FF,?,00F38754,00000000,?,0000001C,?,?), ref: 00F38DE3
                                                                                                                                                                                                  • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00F38754,00000000,?,0000001C,?,?,00000000), ref: 00F37923
                                                                                                                                                                                                  • lstrcpyW.KERNEL32(00000000,?,?,00F38754,00000000,?,0000001C,?,?,00000000), ref: 00F37949
                                                                                                                                                                                                  • lstrcmpiW.KERNEL32(00000002,cdecl,?,00F38754,00000000,?,0000001C,?,?,00000000), ref: 00F37984
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: lstrcmpilstrcpylstrlen
                                                                                                                                                                                                  • String ID: cdecl
                                                                                                                                                                                                  • API String ID: 4031866154-3896280584
                                                                                                                                                                                                  • Opcode ID: bd1625e25724bd57787c98f940f0566db88b5ede1fa12a3648fce0e622e926ba
                                                                                                                                                                                                  • Instruction ID: c24e5010a25305de82bc63d548ba7a39293282a77bf0287d821b274049c889db
                                                                                                                                                                                                  • Opcode Fuzzy Hash: bd1625e25724bd57787c98f940f0566db88b5ede1fa12a3648fce0e622e926ba
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9511067A201345ABCB256F35CC45E7A77A5FF853B0F00412AF842C7264EB71D801E791
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetWindowLongW.USER32(?,000000F0), ref: 00F67D0B
                                                                                                                                                                                                  • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00F67D2A
                                                                                                                                                                                                  • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00F67D42
                                                                                                                                                                                                  • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00F4B7AD,00000000), ref: 00F67D6B
                                                                                                                                                                                                    • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$Long
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 847901565-0
                                                                                                                                                                                                  • Opcode ID: 3173240902ab515836262bfc9ab41bfb0937e44dfe1825a633df67e6f0024962
                                                                                                                                                                                                  • Instruction ID: e4415f5f91a3d57773f480b8a5198c3a52065d77b72cc0f3ecbf053a99a56c59
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3173240902ab515836262bfc9ab41bfb0937e44dfe1825a633df67e6f0024962
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D7115E72605619AFCB10AF28CC04A7A3BA5BF46374F154B24F879D72F0E7319951EB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001060,?,00000004), ref: 00F656BB
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F656CD
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F656D8
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001002,00000000,?), ref: 00F65816
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend_wcslen
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 455545452-0
                                                                                                                                                                                                  • Opcode ID: 20df5a6043854493ee1367fb7f9684b287125c50ca228cffe647b165459b7f4b
                                                                                                                                                                                                  • Instruction ID: e0628a10ca14a27cc72d682989c7b5ed653b24c3c020e77d0f77fe27d87e4b88
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 20df5a6043854493ee1367fb7f9684b287125c50ca228cffe647b165459b7f4b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9811B471A0060996DF20DF61CC85AFE77ACAF11B74F10406AF955F6082EBB4C980EB60
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 7e1733308cb98dccb1097e54311d42e7c2e51a41fa6264ed5af040661280dfb2
                                                                                                                                                                                                  • Instruction ID: cb2ca0020625855aa54121ae00dca34ef3c8588bf2628669944ece719af5ba4a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7e1733308cb98dccb1097e54311d42e7c2e51a41fa6264ed5af040661280dfb2
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9A016DB260A61A7EF62127B86CC5F67762DEF427B8F340326F531A12D2EB649C047170
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B0,?,?), ref: 00F31A47
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F31A59
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F31A6F
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00F31A8A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3850602802-0
                                                                                                                                                                                                  • Opcode ID: b674bbe112543d6a98bded205fe269ae10c5333b117567075236b4a0f8a97117
                                                                                                                                                                                                  • Instruction ID: e2b4bd7eb29eeb71680376f794a5978ff65cbe2d2049a7dc7a561e2e52c5c28c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b674bbe112543d6a98bded205fe269ae10c5333b117567075236b4a0f8a97117
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 3D11F73AD01219FFEF119BA5CD85FADBB78FB08760F200091EA14B7290D6716E50EB94
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00F3E1FD
                                                                                                                                                                                                  • MessageBoxW.USER32(?,?,?,?), ref: 00F3E230
                                                                                                                                                                                                  • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00F3E246
                                                                                                                                                                                                  • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00F3E24D
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2880819207-0
                                                                                                                                                                                                  • Opcode ID: 9af9a68270703e00d5a58aa50a7f75e3849738303e00ef83269b042cc8573212
                                                                                                                                                                                                  • Instruction ID: 9c12ddee068123b1235de68fd51e44759b034c02e608beaf3438cdaba6acc7af
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9af9a68270703e00d5a58aa50a7f75e3849738303e00ef83269b042cc8573212
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D61104B6D0425CBBDB019FA89C09AAF7FACAF46330F004215F964E32D0D2B0D900A7A0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateThread.KERNEL32(00000000,?,00EFCFF9,00000000,00000004,00000000), ref: 00EFD218
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00EFD224
                                                                                                                                                                                                  • __dosmaperr.LIBCMT ref: 00EFD22B
                                                                                                                                                                                                  • ResumeThread.KERNEL32(00000000), ref: 00EFD249
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 173952441-0
                                                                                                                                                                                                  • Opcode ID: 5cc813da6cc267d7d7317af9fef0ff743aad299798f7b1d0a136a48b1c0a1910
                                                                                                                                                                                                  • Instruction ID: 02c4100922c42971865d3cc9123bcd3085f1d4edca5d29f6b3e3b8275335f002
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5cc813da6cc267d7d7317af9fef0ff743aad299798f7b1d0a136a48b1c0a1910
                                                                                                                                                                                                  • Instruction Fuzzy Hash: B301DB3650910CBBE7115BA5DC05BBF7E9ADF82331F105215FA25B21E0CB718901D6E0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00EE9BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00EE9BB2
                                                                                                                                                                                                  • GetClientRect.USER32(?,?), ref: 00F69F31
                                                                                                                                                                                                  • GetCursorPos.USER32(?), ref: 00F69F3B
                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00F69F46
                                                                                                                                                                                                  • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00F69F7A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4127811313-0
                                                                                                                                                                                                  • Opcode ID: 7b599caf9adc8d1db4ee08d3d74ac2c10033b7915514af112dbd7737fba42973
                                                                                                                                                                                                  • Instruction ID: 340729d16362021aff703e63f6448f5cf63715a4ba5bc35c3dbf4ff5b865114e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 7b599caf9adc8d1db4ee08d3d74ac2c10033b7915514af112dbd7737fba42973
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6E11483690411AABDB10DFA8CC499FE77BCFB05311F014455F962E3141D7B4BA81EBA1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00ED604C
                                                                                                                                                                                                  • GetStockObject.GDI32(00000011), ref: 00ED6060
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000030,00000000), ref: 00ED606A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CreateMessageObjectSendStockWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3970641297-0
                                                                                                                                                                                                  • Opcode ID: 600095cdf930954a8e57da12ba052d8b5b6f607f6ff0f31ab864e3fea1b7887d
                                                                                                                                                                                                  • Instruction ID: 2c7131fdcc20433d30bf440e69f54373c04a59fe6e2c353892bf1bf1d97f8f32
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 600095cdf930954a8e57da12ba052d8b5b6f607f6ff0f31ab864e3fea1b7887d
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 2811AD7210150CBFEF225FA4CC44EEABB69FF093A8F001202FA5466210C776DC61EBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • ___BuildCatchObject.LIBVCRUNTIME ref: 00EF3B56
                                                                                                                                                                                                    • Part of subcall function 00EF3AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00EF3AD2
                                                                                                                                                                                                    • Part of subcall function 00EF3AA3: ___AdjustPointer.LIBCMT ref: 00EF3AED
                                                                                                                                                                                                  • _UnwindNestedFrames.LIBCMT ref: 00EF3B6B
                                                                                                                                                                                                  • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00EF3B7C
                                                                                                                                                                                                  • CallCatchBlock.LIBVCRUNTIME ref: 00EF3BA4
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 737400349-0
                                                                                                                                                                                                  • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                  • Instruction ID: b4d89798be72d4b33f02a013059341ba02fc2df70206cf2492dfd09abd0b6504
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6501297210014DBBDF125EA5CC42EFB7BA9EF88758F045015FF4866121C732E961EBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00ED13C6,00000000,00000000,?,00F0301A,00ED13C6,00000000,00000000,00000000,?,00F0328B,00000006,FlsSetValue), ref: 00F030A5
                                                                                                                                                                                                  • GetLastError.KERNEL32(?,00F0301A,00ED13C6,00000000,00000000,00000000,?,00F0328B,00000006,FlsSetValue,00F72290,FlsSetValue,00000000,00000364,?,00F02E46), ref: 00F030B1
                                                                                                                                                                                                  • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00F0301A,00ED13C6,00000000,00000000,00000000,?,00F0328B,00000006,FlsSetValue,00F72290,FlsSetValue,00000000), ref: 00F030BF
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3177248105-0
                                                                                                                                                                                                  • Opcode ID: fd6413f21e5e28f81e67b4f4ebe5524d50110014773e5f9e0a14ffc417f96451
                                                                                                                                                                                                  • Instruction ID: 150ab9e2ba5fb1a3ade936383a705ba70144b0e2a80bc5a24b7a31ba018aeed5
                                                                                                                                                                                                  • Opcode Fuzzy Hash: fd6413f21e5e28f81e67b4f4ebe5524d50110014773e5f9e0a14ffc417f96451
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D4012B33713226ABCB314B79AC44A677B9CAF06B75B104620FD59E31C0D721D901F6E0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00F3747F
                                                                                                                                                                                                  • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00F37497
                                                                                                                                                                                                  • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00F374AC
                                                                                                                                                                                                  • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00F374CA
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Type$Register$FileLoadModuleNameUser
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1352324309-0
                                                                                                                                                                                                  • Opcode ID: 44a650b5da8abc976472f9f26556192b812afd6bdbb6d408396c289b2c2a6bf9
                                                                                                                                                                                                  • Instruction ID: faa8e883a6264cb4833f4e41ad60c48161bac0d928013f9eadb272075595b72c
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 44a650b5da8abc976472f9f26556192b812afd6bdbb6d408396c289b2c2a6bf9
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AC1170B1205314DBE730DF54EC08BA27BF8EB00710F108559E5A6D6191D7B0F904EB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00F3ACD3,?,00008000), ref: 00F3B0C4
                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00F3ACD3,?,00008000), ref: 00F3B0E9
                                                                                                                                                                                                  • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00F3ACD3,?,00008000), ref: 00F3B0F3
                                                                                                                                                                                                  • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00F3ACD3,?,00008000), ref: 00F3B126
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CounterPerformanceQuerySleep
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2875609808-0
                                                                                                                                                                                                  • Opcode ID: 19706de2f886352de7b2327d696e46cdaa0295ee699222bc2152f080bc355d38
                                                                                                                                                                                                  • Instruction ID: 257b5c98c15ae4e4bd3ebbdece64281e2ea13fb5c3be9bde4bacbb44b8ba95a9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 19706de2f886352de7b2327d696e46cdaa0295ee699222bc2152f080bc355d38
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D3116171C0151CD7CF04AFE5D9687FEBB78FF0A721F104085DA91B6285CB705550ABA1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetWindowRect.USER32(?,?), ref: 00F67E33
                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00F67E4B
                                                                                                                                                                                                  • ScreenToClient.USER32(?,?), ref: 00F67E6F
                                                                                                                                                                                                  • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00F67E8A
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 357397906-0
                                                                                                                                                                                                  • Opcode ID: 8c32cc2034335a521d353ee0c076fd688c7766d32875b950207ecaddf01df14b
                                                                                                                                                                                                  • Instruction ID: bf3e7f9bb8b576d256036184f971cdf49ce69e4040ced0dff3dca54274a1e82e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 8c32cc2034335a521d353ee0c076fd688c7766d32875b950207ecaddf01df14b
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D31163B9D0020AAFDB41DF98C8849EEBBF5FB08310F504056E965E3210D775AA54DF90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00F32DC5
                                                                                                                                                                                                  • GetWindowThreadProcessId.USER32(?,00000000), ref: 00F32DD6
                                                                                                                                                                                                  • GetCurrentThreadId.KERNEL32 ref: 00F32DDD
                                                                                                                                                                                                  • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00F32DE4
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2710830443-0
                                                                                                                                                                                                  • Opcode ID: 028e1433ca8f0dd1ce4ef2bd6182715382ac691310eb1d62053174cac744a5e2
                                                                                                                                                                                                  • Instruction ID: bbcd079b4d947d5fc72d182bb7cc78103c58b050203f835a7b6844892c411422
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 028e1433ca8f0dd1ce4ef2bd6182715382ac691310eb1d62053174cac744a5e2
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 98E0ED725012287ADB202B63DC0DFFB7E6CEF56BB1F400115F59AD1090DAE68941E6F1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00EE9639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00EE9693
                                                                                                                                                                                                    • Part of subcall function 00EE9639: SelectObject.GDI32(?,00000000), ref: 00EE96A2
                                                                                                                                                                                                    • Part of subcall function 00EE9639: BeginPath.GDI32(?), ref: 00EE96B9
                                                                                                                                                                                                    • Part of subcall function 00EE9639: SelectObject.GDI32(?,00000000), ref: 00EE96E2
                                                                                                                                                                                                  • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00F68887
                                                                                                                                                                                                  • LineTo.GDI32(?,?,?), ref: 00F68894
                                                                                                                                                                                                  • EndPath.GDI32(?), ref: 00F688A4
                                                                                                                                                                                                  • StrokePath.GDI32(?), ref: 00F688B2
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1539411459-0
                                                                                                                                                                                                  • Opcode ID: b4c58f663cc131c72c7b283983814669e6fa3a54b784feb29ab158075ab14b38
                                                                                                                                                                                                  • Instruction ID: 753d4d63865b75a4e8886ea8523b244814e270721e6f86cf724c672abc604f79
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b4c58f663cc131c72c7b283983814669e6fa3a54b784feb29ab158075ab14b38
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5AF05E3604125DFADB126F94AC09FDE3F69AF0A350F048100FAA1A50E2C7B55511EFE5
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetSysColor.USER32(00000008), ref: 00EE98CC
                                                                                                                                                                                                  • SetTextColor.GDI32(?,?), ref: 00EE98D6
                                                                                                                                                                                                  • SetBkMode.GDI32(?,00000001), ref: 00EE98E9
                                                                                                                                                                                                  • GetStockObject.GDI32(00000005), ref: 00EE98F1
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Color$ModeObjectStockText
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 4037423528-0
                                                                                                                                                                                                  • Opcode ID: a0c773efc367da23e869f827ac0bcf9be21d7b3483bb9c9ae677e16cd1ba8eea
                                                                                                                                                                                                  • Instruction ID: 6d8bb07044a81749efeb7e1776f41c10dd869281b99284ea032863f8ba85f941
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a0c773efc367da23e869f827ac0bcf9be21d7b3483bb9c9ae677e16cd1ba8eea
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 64E09B31644388AFDB216B74FC09BF93F50EB12735F048219F6FA540E5C3B14650AB51
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetCurrentThread.KERNEL32 ref: 00F31634
                                                                                                                                                                                                  • OpenThreadToken.ADVAPI32(00000000,?,?,?,00F311D9), ref: 00F3163B
                                                                                                                                                                                                  • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00F311D9), ref: 00F31648
                                                                                                                                                                                                  • OpenProcessToken.ADVAPI32(00000000,?,?,?,00F311D9), ref: 00F3164F
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CurrentOpenProcessThreadToken
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3974789173-0
                                                                                                                                                                                                  • Opcode ID: d8740ccb2fa93abe1a1f868fff398525e60c0f9340e8bc77f4688815a376111a
                                                                                                                                                                                                  • Instruction ID: 518b0b7718cc744ca125535af8da311726bef37bb1e5db00ce5fc939bfb42b02
                                                                                                                                                                                                  • Opcode Fuzzy Hash: d8740ccb2fa93abe1a1f868fff398525e60c0f9340e8bc77f4688815a376111a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 9EE08631A01215EBD7201FE19D0EB663B7CBF447A1F144808F6D5C9080D6B44440E790
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00F2D858
                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 00F2D862
                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00F2D882
                                                                                                                                                                                                  • ReleaseDC.USER32(?), ref: 00F2D8A3
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2889604237-0
                                                                                                                                                                                                  • Opcode ID: 03c22deacb223a20c370d76286b4ff9f5613f86a75b58826bdd9139a7923158c
                                                                                                                                                                                                  • Instruction ID: da55104211cc381161d9fab577246f1e694fbb893eb319a2bd8fe1644a26437f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 03c22deacb223a20c370d76286b4ff9f5613f86a75b58826bdd9139a7923158c
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E6E01AB5800209EFCB419FA0D8086BDBBF2FB08310F24A009E89AE7250C7B95901BF84
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetDesktopWindow.USER32 ref: 00F2D86C
                                                                                                                                                                                                  • GetDC.USER32(00000000), ref: 00F2D876
                                                                                                                                                                                                  • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00F2D882
                                                                                                                                                                                                  • ReleaseDC.USER32(?), ref: 00F2D8A3
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 2889604237-0
                                                                                                                                                                                                  • Opcode ID: 9fb88d8c890c4f7ae716a9a6221e71bbca227090fcba4b542ce3d95fd582ad13
                                                                                                                                                                                                  • Instruction ID: 084d957cd98397c5d132c1e9259698649e77f15d45c15c08e1c9f77a589c25fa
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 9fb88d8c890c4f7ae716a9a6221e71bbca227090fcba4b542ce3d95fd582ad13
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 55E01A70800208EFCB409FA0D80866DBBF1FB08310B14A009E89AE7250C7B95901AF84
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED7620: _wcslen.LIBCMT ref: 00ED7625
                                                                                                                                                                                                  • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00F44ED4
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Connection_wcslen
                                                                                                                                                                                                  • String ID: *$LPT
                                                                                                                                                                                                  • API String ID: 1725874428-3443410124
                                                                                                                                                                                                  • Opcode ID: cc6f664339e8b037bfa1c42eefb7edece79de7b642304f86131c32aefc301d57
                                                                                                                                                                                                  • Instruction ID: 5a92a76d425179ad8a847b77d191ce25666496fdb103bf51332357d13cf56674
                                                                                                                                                                                                  • Opcode Fuzzy Hash: cc6f664339e8b037bfa1c42eefb7edece79de7b642304f86131c32aefc301d57
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CA915E75A002049FDB14DF58C484FA9BBF1BF44324F198099E84AAF3A2D735ED86DB91
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • __startOneArgErrorHandling.LIBCMT ref: 00EFE30D
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ErrorHandling__start
                                                                                                                                                                                                  • String ID: pow
                                                                                                                                                                                                  • API String ID: 3213639722-2276729525
                                                                                                                                                                                                  • Opcode ID: 787d8ffbe580980e772599e62fa0c57ea702bccf736d4390a322700f34f18d31
                                                                                                                                                                                                  • Instruction ID: 0382366f6276bfbda20166537b1e43f6e7c81a277355f1c8cfabc8b420c890a1
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 787d8ffbe580980e772599e62fa0c57ea702bccf736d4390a322700f34f18d31
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BF516A61E0E30A96DB157B14CD053BA3BA4AB40750F3099D8E1D5923F9EB34ACD1BA46
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID: #
                                                                                                                                                                                                  • API String ID: 0-1885708031
                                                                                                                                                                                                  • Opcode ID: 1167aeb3f9231781d81172b7eef650688ff0ef38b936ff9eb05e56b50f466a81
                                                                                                                                                                                                  • Instruction ID: 6269e1c6ccf8c67db8aa7ff9e45e07418ad77a9eebce5771440c8f33da7a7d2f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1167aeb3f9231781d81172b7eef650688ff0ef38b936ff9eb05e56b50f466a81
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 5C513435A0029ADFDB15DF68D4816FA7BA8EF19320F245055ECA1AB3D0D6349D42EBA0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • Sleep.KERNEL32(00000000), ref: 00EEF2A2
                                                                                                                                                                                                  • GlobalMemoryStatusEx.KERNEL32(?), ref: 00EEF2BB
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: GlobalMemorySleepStatus
                                                                                                                                                                                                  • String ID: @
                                                                                                                                                                                                  • API String ID: 2783356886-2766056989
                                                                                                                                                                                                  • Opcode ID: 00db846c2d67d50c026b7a32dd13faa019609ef602f74117b0ca05ce22f5d28f
                                                                                                                                                                                                  • Instruction ID: 189f0884c758619b4ac76f696e34ae48bdb4d5402b45ea6657ce8eb05560d3ed
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 00db846c2d67d50c026b7a32dd13faa019609ef602f74117b0ca05ce22f5d28f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C55158715087499BD320AF10DC86BAFBBF8FB84340F91884DF1D9911A5EB70852ACB66
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00F557E0
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F557EC
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: BuffCharUpper_wcslen
                                                                                                                                                                                                  • String ID: CALLARGARRAY
                                                                                                                                                                                                  • API String ID: 157775604-1150593374
                                                                                                                                                                                                  • Opcode ID: ee1de5ca8dd5f9078b694159dc85343020b421f4eee54f3c692a4d59b05c39d6
                                                                                                                                                                                                  • Instruction ID: b75fd6a3b31cdf76b6472c7b43431231df0e78d73e4f903eb8b78198872a1d3f
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ee1de5ca8dd5f9078b694159dc85343020b421f4eee54f3c692a4d59b05c39d6
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CB41F231E002099FCB04DFA8C8919BEBBF5FF59722F104029E905A7291E7319D85DB90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F4D130
                                                                                                                                                                                                  • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00F4D13A
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CrackInternet_wcslen
                                                                                                                                                                                                  • String ID: |
                                                                                                                                                                                                  • API String ID: 596671847-2343686810
                                                                                                                                                                                                  • Opcode ID: e2a09c1bf739855d5df34bfac90036249b148b33314974009fb8f8be261e7d6f
                                                                                                                                                                                                  • Instruction ID: a42f90ae67bc5e80054647c7bb7958f9e2b8d7b2298a01b959c17a906d468009
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e2a09c1bf739855d5df34bfac90036249b148b33314974009fb8f8be261e7d6f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D0311875D00209ABDF15EFA4CC85AEEBFB9FF44310F10001AED15B6262E731AA46DB60
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • DestroyWindow.USER32(?,?,?,?), ref: 00F63621
                                                                                                                                                                                                  • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00F6365C
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$DestroyMove
                                                                                                                                                                                                  • String ID: static
                                                                                                                                                                                                  • API String ID: 2139405536-2160076837
                                                                                                                                                                                                  • Opcode ID: 6804971138216b8911b298b0fb916a7016834a4f5d1f5fe31fb9866df4291903
                                                                                                                                                                                                  • Instruction ID: 5579cedf719354853fb1ccbb0afab944e6a17038413096d8195c6b38817458bb
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6804971138216b8911b298b0fb916a7016834a4f5d1f5fe31fb9866df4291903
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7231B071500204AEDB109F68CC40EFB73A9FF88764F009619F8A5D7280DA71AD81E760
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00F6461F
                                                                                                                                                                                                  • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00F64634
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                  • String ID: '
                                                                                                                                                                                                  • API String ID: 3850602802-1997036262
                                                                                                                                                                                                  • Opcode ID: 06ca63f4857d793cda7f2e9d84737e12928c222d6b0b126251c06d1f7e73afe1
                                                                                                                                                                                                  • Instruction ID: c3fef1b786fbd5a8802a01b04b4c8323fa635eb7ce5f5ff1a4b0c9d7bdf061c4
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 06ca63f4857d793cda7f2e9d84737e12928c222d6b0b126251c06d1f7e73afe1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 20313975A0130A9FDF14DFA9C980BDABBB5FF09300F14406AE905AB381D771A941DF90
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00F6327C
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00F63287
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: MessageSend
                                                                                                                                                                                                  • String ID: Combobox
                                                                                                                                                                                                  • API String ID: 3850602802-2096851135
                                                                                                                                                                                                  • Opcode ID: 1f45bfb5440aea4aac08b880fbf620f666bd94c4928a8942f2c8168ad0d310c3
                                                                                                                                                                                                  • Instruction ID: 591e5e3d673b967d25895859f7ce6761a36356202061585de1a75ab67f9db4a9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 1f45bfb5440aea4aac08b880fbf620f666bd94c4928a8942f2c8168ad0d310c3
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 8711B2717002087FFF219E54DC90EBB37AAEB953A4F104129F92897291D6719D51A760
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00ED604C
                                                                                                                                                                                                    • Part of subcall function 00ED600E: GetStockObject.GDI32(00000011), ref: 00ED6060
                                                                                                                                                                                                    • Part of subcall function 00ED600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00ED606A
                                                                                                                                                                                                  • GetWindowRect.USER32(00000000,?), ref: 00F6377A
                                                                                                                                                                                                  • GetSysColor.USER32(00000012), ref: 00F63794
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                                                                                                  • String ID: static
                                                                                                                                                                                                  • API String ID: 1983116058-2160076837
                                                                                                                                                                                                  • Opcode ID: 30a7a87b8ed49e5d92c69257272c28d4b9f6291d72bb0ecd7c0cc65a98304c11
                                                                                                                                                                                                  • Instruction ID: 5caff26a820c2c57838e4690c73a2fbbab5c62f23f1ead7a3b6801a6deb38cbf
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 30a7a87b8ed49e5d92c69257272c28d4b9f6291d72bb0ecd7c0cc65a98304c11
                                                                                                                                                                                                  • Instruction Fuzzy Hash: BC1129B2610209AFDF10DFA8CC45AFA7BB8FB09354F004515F9A6E3250D775E851AB50
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00F4CD7D
                                                                                                                                                                                                  • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00F4CDA6
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Internet$OpenOption
                                                                                                                                                                                                  • String ID: <local>
                                                                                                                                                                                                  • API String ID: 942729171-4266983199
                                                                                                                                                                                                  • Opcode ID: ab77458902b57b001d57f39700abce466315a265194993c2cdb52d43991235c4
                                                                                                                                                                                                  • Instruction ID: 3f1abc5b13475eecb55c37723f0191d8e7a81b4cfd36b5bb9ba04dd246fbc8c9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ab77458902b57b001d57f39700abce466315a265194993c2cdb52d43991235c4
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 0311A372A066367AD7684A668C45FF7BE78EF127B4F005226F96983190D6609840E6F0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetWindowTextLengthW.USER32(00000000), ref: 00F634AB
                                                                                                                                                                                                  • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00F634BA
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: LengthMessageSendTextWindow
                                                                                                                                                                                                  • String ID: edit
                                                                                                                                                                                                  • API String ID: 2978978980-2167791130
                                                                                                                                                                                                  • Opcode ID: 3eb6f75a2fbae9c6582bf8769b7c927d50a70f71156421246209c17dbad30550
                                                                                                                                                                                                  • Instruction ID: 97913c2ad28c07756ab3d63577ff08ab759b5ea1021850663162cf3b28c7c234
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3eb6f75a2fbae9c6582bf8769b7c927d50a70f71156421246209c17dbad30550
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 48118F71500108ABEF218E64DC44AFB776AEF05374F504324F9A5931E4CB75DC51B750
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                  • CharUpperBuffW.USER32(?,?,?), ref: 00F36CB6
                                                                                                                                                                                                  • _wcslen.LIBCMT ref: 00F36CC2
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                  • String ID: STOP
                                                                                                                                                                                                  • API String ID: 1256254125-2411985666
                                                                                                                                                                                                  • Opcode ID: a90aa89917be69db64b2159f18390fdbabd8137b143a5cf3da1c904f321b65fa
                                                                                                                                                                                                  • Instruction ID: f16438605d1f60b1fc597288d2718b5459e2801538a61ef191bf97889375f4fc
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a90aa89917be69db64b2159f18390fdbabd8137b143a5cf3da1c904f321b65fa
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 6D010432A00527AACB209FBDDC809BF73F4EA60775B105529E862E6291EA31D900E750
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                    • Part of subcall function 00F33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F33CCA
                                                                                                                                                                                                  • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00F31D4C
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                  • API String ID: 624084870-1403004172
                                                                                                                                                                                                  • Opcode ID: dc724770bb8fdc41f9ea939748bda53a65244a973c6dd89b2ef0decc3cc7dc82
                                                                                                                                                                                                  • Instruction ID: f9dc1818514cb1a922da7123e63a0c897b676c556b37ecbc52bf2c50d13b4323
                                                                                                                                                                                                  • Opcode Fuzzy Hash: dc724770bb8fdc41f9ea939748bda53a65244a973c6dd89b2ef0decc3cc7dc82
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 09012835A00218AB8B08EFA0DC11DFE73A8FB47770F10051AF872673C2EA345909A760
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                    • Part of subcall function 00F33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F33CCA
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000180,00000000,?), ref: 00F31C46
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                  • API String ID: 624084870-1403004172
                                                                                                                                                                                                  • Opcode ID: a9a6336f6f4d26dd969458772bc3c17bccbe231b6c73d306f85a97fd27747c68
                                                                                                                                                                                                  • Instruction ID: 52fe16eba1c9237cb4454cea6e70198b50993fed246cbd30c9aeebae731da666
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a9a6336f6f4d26dd969458772bc3c17bccbe231b6c73d306f85a97fd27747c68
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AA01F775B8010866DF08EBA0DD51EFF73E8EB11790F10201AB41677282EA249E08A7B1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                    • Part of subcall function 00F33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F33CCA
                                                                                                                                                                                                  • SendMessageW.USER32(?,00000182,?,00000000), ref: 00F31CC8
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                  • API String ID: 624084870-1403004172
                                                                                                                                                                                                  • Opcode ID: 3d63217daddb160582d0d29ecc04f4bb418e7db4cfe1c8a9226b2e5008fede8f
                                                                                                                                                                                                  • Instruction ID: 8bbb8936d284a67252018bc3d5e8aab8606b171a14e6d3fe2140daf42690fdff
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3d63217daddb160582d0d29ecc04f4bb418e7db4cfe1c8a9226b2e5008fede8f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: AC01D675B8011867DF04EBA0DE01AFE73E8AB117A0F142016B80277282EA659F09E672
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00ED9CB3: _wcslen.LIBCMT ref: 00ED9CBD
                                                                                                                                                                                                    • Part of subcall function 00F33CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00F33CCA
                                                                                                                                                                                                  • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00F31DD3
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                  • String ID: ComboBox$ListBox
                                                                                                                                                                                                  • API String ID: 624084870-1403004172
                                                                                                                                                                                                  • Opcode ID: e8fa0e6be12b7d5adb5b9490383763c575460753041e715de913f69f23754f50
                                                                                                                                                                                                  • Instruction ID: 02d25f0bb657355a48738458dec04417388d2232821a4e83840dece1fc4d202b
                                                                                                                                                                                                  • Opcode Fuzzy Hash: e8fa0e6be12b7d5adb5b9490383763c575460753041e715de913f69f23754f50
                                                                                                                                                                                                  • Instruction Fuzzy Hash: FAF0F471B4021866DB08EBA4DC52BFE73A8FF02760F041916B822772C2DA649909A260
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: _wcslen
                                                                                                                                                                                                  • String ID: 3, 3, 16, 1
                                                                                                                                                                                                  • API String ID: 176396367-3042988571
                                                                                                                                                                                                  • Opcode ID: ac11f7f2ad6d827c1db1cf6dddd1ca9b9e01db423ecc71341e4d35365f6b856f
                                                                                                                                                                                                  • Instruction ID: 575632957d4453d70f87d8caf99a93ce1838632a3edd93a333bb5e547d634240
                                                                                                                                                                                                  • Opcode Fuzzy Hash: ac11f7f2ad6d827c1db1cf6dddd1ca9b9e01db423ecc71341e4d35365f6b856f
                                                                                                                                                                                                  • Instruction Fuzzy Hash: EEE02B427143215093313279BCC197F56C9CFC5761714282FFF85D22A7EAD4CD91A3A1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00F30B23
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Message
                                                                                                                                                                                                  • String ID: AutoIt$Error allocating memory.
                                                                                                                                                                                                  • API String ID: 2030045667-4017498283
                                                                                                                                                                                                  • Opcode ID: 2880d0273881b292aa50ce7289766442b6819d370c8c37dbae60659f7f37d44a
                                                                                                                                                                                                  • Instruction ID: 38bbc2275cdd1ce0cf9bb7c8691e91b57187c527f5a336008385294c524a8ccf
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 2880d0273881b292aa50ce7289766442b6819d370c8c37dbae60659f7f37d44a
                                                                                                                                                                                                  • Instruction Fuzzy Hash: E8E04F3228435C2AE31436957C03F997AC48F05F61F10542BFBD8B95D38AE2649066EA
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                    • Part of subcall function 00EEF7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00EF0D71,?,?,?,00ED100A), ref: 00EEF7CE
                                                                                                                                                                                                  • IsDebuggerPresent.KERNEL32(?,?,?,00ED100A), ref: 00EF0D75
                                                                                                                                                                                                  • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00ED100A), ref: 00EF0D84
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00EF0D7F
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                                                                                                                  • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                                                  • API String ID: 55579361-631824599
                                                                                                                                                                                                  • Opcode ID: b828bb3b118cc903a76fd7136b8f7cd650d9516c85a1d6fc85fefb85cfdb9f0e
                                                                                                                                                                                                  • Instruction ID: 669d86f78487af3565a45ff5803df9d488f9a2a38766e2b2f00c4eb727760c68
                                                                                                                                                                                                  • Opcode Fuzzy Hash: b828bb3b118cc903a76fd7136b8f7cd650d9516c85a1d6fc85fefb85cfdb9f0e
                                                                                                                                                                                                  • Instruction Fuzzy Hash: C6E092742003558BD7309FB8E4043667BE4BF14744F00992EE9D2D6652EBF2E4489BD1
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00F4302F
                                                                                                                                                                                                  • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00F43044
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: Temp$FileNamePath
                                                                                                                                                                                                  • String ID: aut
                                                                                                                                                                                                  • API String ID: 3285503233-3010740371
                                                                                                                                                                                                  • Opcode ID: 86b8dc6ad7cb6c813ecd4ee97c67efbee32b6d1a97377c1b5b21e73984d1be55
                                                                                                                                                                                                  • Instruction ID: 8c0f6c59b27a38b6857a4976f48fb7c6253bd957186eda794774c65eed905b0e
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 86b8dc6ad7cb6c813ecd4ee97c67efbee32b6d1a97377c1b5b21e73984d1be55
                                                                                                                                                                                                  • Instruction Fuzzy Hash: D0D05E7250032867DA20A7A4EC0EFDB3A6CDB04750F0002A2BAE5E2091DAF4D984CBD0
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: LocalTime
                                                                                                                                                                                                  • String ID: %.3d$X64
                                                                                                                                                                                                  • API String ID: 481472006-1077770165
                                                                                                                                                                                                  • Opcode ID: 5af3cd1b522b04f9935f0a248b69c4a8d8c30f2b994707090240df7f1c5a79a1
                                                                                                                                                                                                  • Instruction ID: d5827ce1fd693e56ea64407c8a1642fd429fae12aa651896164b69818075cc7d
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 5af3cd1b522b04f9935f0a248b69c4a8d8c30f2b994707090240df7f1c5a79a1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 36D0126280822CEADB5097E0EC45AF9B3BCEB08301F608452F906A1080D624C508B762
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F6236C
                                                                                                                                                                                                  • PostMessageW.USER32(00000000), ref: 00F62373
                                                                                                                                                                                                    • Part of subcall function 00F3E97B: Sleep.KERNEL32 ref: 00F3E9F3
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                  • String ID: Shell_TrayWnd
                                                                                                                                                                                                  • API String ID: 529655941-2988720461
                                                                                                                                                                                                  • Opcode ID: 06c682279bee2a31eeb99bd807de1908d1a2b332e1bb7f5a38c59682ece00442
                                                                                                                                                                                                  • Instruction ID: fb179d2dcb390e7df1b279130ae80bcb3a1f30c7eb75029f1b4b27df5c76e651
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 06c682279bee2a31eeb99bd807de1908d1a2b332e1bb7f5a38c59682ece00442
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 07D0C9323813147AEA64B770EC0FFDA7A149B04B10F004916B696EA1D1C9E4A8019A99
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00F6232C
                                                                                                                                                                                                  • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00F6233F
                                                                                                                                                                                                    • Part of subcall function 00F3E97B: Sleep.KERNEL32 ref: 00F3E9F3
                                                                                                                                                                                                  Strings
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                  • String ID: Shell_TrayWnd
                                                                                                                                                                                                  • API String ID: 529655941-2988720461
                                                                                                                                                                                                  • Opcode ID: 23a6aad272b419a98aaa1ae368bca219f26531a1725e21c2a0f7010067176bf1
                                                                                                                                                                                                  • Instruction ID: cc724ccde0613c87c7895aba91c6faef9d2fb55962e00c25d175484d3c5fe8b9
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 23a6aad272b419a98aaa1ae368bca219f26531a1725e21c2a0f7010067176bf1
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 1AD01236395314B7EA64B770EC0FFDA7A149F04B10F004916B7DAEA1D1C9F4A801DB94
                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00F0BE93
                                                                                                                                                                                                  • GetLastError.KERNEL32 ref: 00F0BEA1
                                                                                                                                                                                                  • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00F0BEFC
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000000.00000002.1722410828.0000000000ED1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00ED0000, based on PE: true
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722371802.0000000000ED0000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F6C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722504274.0000000000F92000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722586688.0000000000F9C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  • Associated: 00000000.00000002.1722618810.0000000000FA4000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_0_2_ed0000_file.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 1717984340-0
                                                                                                                                                                                                  • Opcode ID: 6b7460cd915e54e28d148c72b00877568e0b0531a7b8222acd0cb4aeda81faf7
                                                                                                                                                                                                  • Instruction ID: c3d5af6f098458e9a9a09b72521cc757c4e8ae07045740ade7d523dd13c47b53
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 6b7460cd915e54e28d148c72b00877568e0b0531a7b8222acd0cb4aeda81faf7
                                                                                                                                                                                                  • Instruction Fuzzy Hash: CC41D635A05207AFDF218FA4CC44BBA7BA9EF42721F144169FA599B1E1DB708D01FB60

                                                                                                                                                                                                  Execution Graph

                                                                                                                                                                                                  Execution Coverage:0.4%
                                                                                                                                                                                                  Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                  Signature Coverage:100%
                                                                                                                                                                                                  Total number of Nodes:6
                                                                                                                                                                                                  Total number of Limit Nodes:0
                                                                                                                                                                                                  execution_graph 5002 210164667b7 5003 210164667c7 NtQuerySystemInformation 5002->5003 5004 21016466764 5003->5004 5005 210164a2c72 5006 210164a2cc9 NtQuerySystemInformation 5005->5006 5007 210164a1044 5005->5007 5006->5007

                                                                                                                                                                                                  Callgraph

                                                                                                                                                                                                  APIs
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000010.00000002.2909557935.0000021016462000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000021016462000, based on PE: false
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_16_2_21016462000_firefox.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID: InformationQuerySystem
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID: 3562636166-0
                                                                                                                                                                                                  • Opcode ID: a3d4a310f25344abd1978f5247c9d082b9ccbb3eaa73dfa71153365510a96fee
                                                                                                                                                                                                  • Instruction ID: e45dc035f1b37d807b62fc377f04b36029bba90e942d97a443739818a0a54a3a
                                                                                                                                                                                                  • Opcode Fuzzy Hash: a3d4a310f25344abd1978f5247c9d082b9ccbb3eaa73dfa71153365510a96fee
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 55A3F431614A498BDB2DDF68DC857E973E5FB96300F14422ED94BC3251DF74EA828AC1

                                                                                                                                                                                                  Control-flow Graph

                                                                                                                                                                                                  • Executed
                                                                                                                                                                                                  • Not Executed
                                                                                                                                                                                                  control_flow_graph 2850 2101646c780-2101646c7c3 2852 2101646c7c7-2101646c7c9 2850->2852 2853 2101646c81f-2101646c851 2852->2853 2854 2101646c7cb-2101646c802 2852->2854 2854->2853
                                                                                                                                                                                                  Memory Dump Source
                                                                                                                                                                                                  • Source File: 00000010.00000002.2909557935.000002101646C000.00000020.00000001.00020000.00000000.sdmp, Offset: 000002101646C000, based on PE: false
                                                                                                                                                                                                  Joe Sandbox IDA Plugin
                                                                                                                                                                                                  • Snapshot File: hcaresult_16_2_2101646c000_firefox.jbxd
                                                                                                                                                                                                  Similarity
                                                                                                                                                                                                  • API ID:
                                                                                                                                                                                                  • String ID:
                                                                                                                                                                                                  • API String ID:
                                                                                                                                                                                                  • Opcode ID: 3b6a6a3cd582249f4535e9afe6fa2c90769645c1a7d04e20c7c1c8457bd449dc
                                                                                                                                                                                                  • Instruction ID: 30601608985f5d2c8205407a3f35f6026d909dc937a34f793ad700fde56702cd
                                                                                                                                                                                                  • Opcode Fuzzy Hash: 3b6a6a3cd582249f4535e9afe6fa2c90769645c1a7d04e20c7c1c8457bd449dc
                                                                                                                                                                                                  • Instruction Fuzzy Hash: 7421933160CB8D4FD745EF28C844B96BBE1FB6A310F1406AFE089C3292DA78D9458782