Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1546669
MD5:ceac3c3fb770fceb89de4981f995c333
SHA1:67529ec389c9ab3769ab79aad33c1840e4371180
SHA256:7f471e1fe8730d1c9013199f1945a0f73596d903362d26ad3507c668593ef677
Tags:exeuser-Bitsight
Infos:

Detection

Credential Flusher
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Credential Flusher
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
Found stalling execution ending in API Sleep call
Machine Learning detection for sample
Connects to many different domains
Contains functionality for execution timing, often used to detect debuggers
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to execute programs as a different user
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
OS version to string mapping found (often used in BOTs)
PE file contains sections with non-standard names
Potential key logger detected (key state polling based)
Sample execution stops while process was sleeping (likely an evasion)
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Uses taskkill to terminate processes

Classification

  • System is w10x64
  • file.exe (PID: 6728 cmdline: "C:\Users\user\Desktop\file.exe" MD5: CEAC3C3FB770FCEB89DE4981F995C333)
    • taskkill.exe (PID: 6772 cmdline: taskkill /F /IM firefox.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 6776 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 6824 cmdline: taskkill /F /IM chrome.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 2004 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 2108 cmdline: taskkill /F /IM msedge.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 4944 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 5100 cmdline: taskkill /F /IM opera.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 4948 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • taskkill.exe (PID: 2016 cmdline: taskkill /F /IM brave.exe /T MD5: CA313FD7E6C2A778FFD21CFB5C1C56CD)
      • conhost.exe (PID: 7032 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • firefox.exe (PID: 6772 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • firefox.exe (PID: 6428 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
    • firefox.exe (PID: 4828 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 3468 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2308 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b782c814-8c81-47ba-94c2-df392bb2665e} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" 1b26d96f710 socket MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 7644 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4104 -parentBuildID 20230927232528 -prefsHandle 3944 -prefMapHandle 3996 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a411c8dc-255d-4563-a475-6fb43a43af83} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" 1b26d97b610 rdd MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
      • firefox.exe (PID: 8184 cmdline: "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5016 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 3760 -prefMapHandle 3756 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd112c45-1629-47bd-a8be-e043aeb3b23d} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" 1b285591d10 utility MD5: C86B1BE9ED6496FE0E0CBE73F81D8045)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000003.1700677570.0000000001031000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
    Process Memory Space: file.exe PID: 6728JoeSecurity_CredentialFlusherYara detected Credential FlusherJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-11-01T12:41:00.691166+010020229301A Network Trojan was detected4.175.87.197443192.168.2.449761TCP
      2024-11-01T12:41:38.835389+010020229301A Network Trojan was detected172.202.163.200443192.168.2.449786TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: file.exeReversingLabs: Detection: 47%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
      Source: file.exeJoe Sandbox ML: detected
      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49741 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49746 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49749 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49758 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49765 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49763 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49769 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49770 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49775 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49776 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 151.101.193.91:443 -> 192.168.2.4:49777 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49781 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49782 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49780 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49783 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49804 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49806 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49805 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:50062 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:50060 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:50061 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:50059 version: TLS 1.2
      Source: Binary string: UMPDC.pdb source: firefox.exe, 0000000D.00000003.1864070228.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878060088.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: wininet.pdb source: firefox.exe, 0000000D.00000003.1864070228.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: sspicli.pdbrasterize_blobs_time source: firefox.exe, 0000000D.00000003.1864070228.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: xWindows.Security.Integrity.pdb source: firefox.exe, 0000000D.00000003.1863025384.000001B27EEAC000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: winsta.pdb source: firefox.exe, 0000000D.00000003.1878468379.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: ktmw32.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: pnrpnsp.pdb source: firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: wshbth.pdb source: firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: WscApi.pdb source: firefox.exe, 0000000D.00000003.1871962334.000001B27EA72000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864070228.000001B27EA72000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: NapiNSP.pdb source: firefox.exe, 0000000D.00000003.1879790335.000001B27D0D0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: xWindows.StateRepositoryPS.pdb source: firefox.exe, 0000000D.00000003.1864070228.000001B27EA46000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA13000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1872568294.000001B27EA46000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA13000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: xOneCoreUAPCommonProxyStub.pdb source: firefox.exe, 0000000D.00000003.1863025384.000001B27EEAC000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: webauthn.pdbGCTL source: firefox.exe, 0000000D.00000003.1825960687.000001B285E01000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: xul.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: nssckbi.pdb source: firefox.exe, 0000000D.00000003.1864070228.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864070228.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878060088.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: winnsi.pdb source: firefox.exe, 0000000D.00000003.1878468379.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: dcomp.pdb source: firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: CLBCatQ.pdb source: firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: urlmon.pdb source: firefox.exe, 0000000D.00000003.1871962334.000001B27EA72000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864070228.000001B27EA72000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: NapiNSP.pdbUGP source: firefox.exe, 0000000D.00000003.1879790335.000001B27D0D0000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: dnsapi.pdb source: firefox.exe, 0000000D.00000003.1878875950.000001B27E3D5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: userenv.pdb source: firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: nlaapi.pdb source: firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: devobj.pdb source: firefox.exe, 0000000D.00000003.1878468379.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: d3d11.pdb source: firefox.exe, 0000000D.00000003.1871962334.000001B27EA72000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864070228.000001B27EA72000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: dwmapi.pdb source: firefox.exe, 0000000D.00000003.1878468379.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: srvcli.pdb source: firefox.exe, 0000000D.00000003.1864070228.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878060088.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: webauthn.pdb source: firefox.exe, 0000000D.00000003.1825960687.000001B285E01000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: freebl3.pdb source: firefox.exe, 0000000D.00000003.1864070228.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878060088.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: profapi.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: mswsock.pdb source: firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: nsi.pdb source: firefox.exe, 0000000D.00000003.1878875950.000001B27E3D5000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: propsys.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.13.dr
      Source: Binary string: winmm.pdb source: firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: winrnr.pdb source: firefox.exe, 0000000D.00000003.1878468379.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: msctf.pdb source: firefox.exe, 0000000D.00000003.1878468379.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: version.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: dbgcore.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: mscms.pdb source: firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: twinapi.pdb source: firefox.exe, 0000000D.00000003.1878468379.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: msasn1.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.13.dr
      Source: Binary string: psapi.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: dbghelp.pdbUrlClassifierStreamUpdater source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: DWrite.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: dxgi.pdb source: firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: ncrypt.pdb source: firefox.exe, 0000000D.00000003.1864070228.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: sspicli.pdbBackgroundThreadPool #4 source: firefox.exe, 0000000D.00000003.1864070228.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EADBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00EADBBE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB68EE FindFirstFileW,FindClose,0_2_00EB68EE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00EB698F
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EAD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EAD076
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EAD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EAD3A9
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EB9642
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EB979D
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00EB9B2B
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00EB5C97
      Source: firefox.exeMemory has grown: Private usage: 38MB later: 221MB
      Source: unknownNetwork traffic detected: DNS query count 31
      Source: Joe Sandbox ViewIP Address: 34.149.100.209 34.149.100.209
      Source: Joe Sandbox ViewIP Address: 34.117.188.166 34.117.188.166
      Source: Joe Sandbox ViewIP Address: 151.101.193.91 151.101.193.91
      Source: Joe Sandbox ViewIP Address: 34.160.144.191 34.160.144.191
      Source: Joe Sandbox ViewJA3 fingerprint: fb0aa01abe9d8e4037eb3473ca6e2dca
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 4.175.87.197:443 -> 192.168.2.4:49761
      Source: Network trafficSuricata IDS: 2022930 - Severity 1 - ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow : 172.202.163.200:443 -> 192.168.2.4:49786
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EBCE44 InternetReadFile,SetEvent,GetLastError,SetEvent,0_2_00EBCE44
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: global trafficHTTP traffic detected: GET /canonical.html HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateCache-Control: no-cachePragma: no-cacheConnection: keep-alive
      Source: global trafficHTTP traffic detected: GET /success.txt?ipv4 HTTP/1.1Host: detectportal.firefox.comUser-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0Accept: */*Accept-Language: en-US,en;q=0.5Accept-Encoding: gzip, deflateConnection: keep-alivePragma: no-cacheCache-Control: no-cache
      Source: firefox.exe, 0000000D.00000003.1785070384.000001B27E86E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: *://www.facebook.com/* equals www.facebook.com (Facebook)
      Source: firefox.exe, 0000000D.00000003.1876949736.000001B27FF6E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1870911117.000001B27FF6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.facebook.com/* equals www.facebook.com (Facebook)
      Source: firefox.exe, 0000000D.00000003.1851137164.000001B289989000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1835768799.000001B289984000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8*://www.youtube.com/* equals www.youtube.com (Youtube)
      Source: firefox.exe, 0000000D.00000003.1725578212.000001B285BDC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833958651.000001B27F4C3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1839144576.000001B285BD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.facebook.com/ equals www.facebook.com (Facebook)
      Source: firefox.exe, 0000000D.00000003.1725578212.000001B285BDC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833958651.000001B27F4C3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1839144576.000001B285BD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8https://www.youtube.com/ equals www.youtube.com (Youtube)
      Source: firefox.exe, 0000000D.00000003.1877966815.000001B27EEFA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1876949736.000001B27FF6E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1870911117.000001B27FF6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.facebook.com equals www.facebook.com (Facebook)
      Source: firefox.exe, 0000000D.00000003.1851137164.000001B289989000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1835768799.000001B289984000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867434969.000001B28998C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: 8www.youtube.com equals www.youtube.com (Youtube)
      Source: firefox.exe, 0000000D.00000003.1725578212.000001B285BDC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728377027.000001B27E066000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833958651.000001B27F4C3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.facebook.com/ equals www.facebook.com (Facebook)
      Source: firefox.exe, 0000000D.00000003.1725578212.000001B285BDC000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833958651.000001B27F4C3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1839144576.000001B285BD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/ equals www.youtube.com (Youtube)
      Source: firefox.exe, 0000000D.00000003.1874658965.000001B28114C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB80A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B6530C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.facebook.com (Facebook)
      Source: firefox.exe, 0000000D.00000003.1874658965.000001B28114C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB80A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B6530C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.twitter.com (Twitter)
      Source: firefox.exe, 0000000D.00000003.1874658965.000001B28114C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB80A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B6530C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/ equals www.youtube.com (Youtube)
      Source: firefox.exe, 0000000D.00000003.1874658965.000001B28114C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/k equals www.facebook.com (Facebook)
      Source: firefox.exe, 0000000D.00000003.1874658965.000001B28114C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/k equals www.twitter.com (Twitter)
      Source: firefox.exe, 0000000D.00000003.1874658965.000001B28114C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/,https://www.facebook.com/,https://www.wikipedia.org/,https://www.reddit.com/,https://www.amazon.com/,https://twitter.com/k equals www.youtube.com (Youtube)
      Source: firefox.exe, 0000000D.00000003.1835989768.000001B2895C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1851265395.000001B2895C9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1828083866.000001B2895C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: moz-extension://a581a2f1-688c-434b-8db8-16166b1993d9/injections/js/bug1842437-www.youtube.com-performance-now-precision.js equals www.youtube.com (Youtube)
      Source: firefox.exe, 0000000D.00000003.1728377027.000001B27E066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: serp-ad-telemetry-rolloutoptInToExperiment/branch<https://www.facebook.com/https://www.leboncoin.fr/main/nimbus-desktop-experiments recipes from Remote Settingsgoogle@search.mozilla.orghttps://www.aliexpress.com/nimbus-desktop-experimentsUpdateSessionStoreForStoragehttps://www.amazon.co.uk/https://www.wikipedia.org/Could not find branch slug _RemoteSettingsExperimentLoadernimbus:enrollments-updated did not match recipe schema did not match due to targetinghttps://www.wikipedia.org/bound onEnabledPrefChangers-experiment-loader-timer__MSG_extensionDescription__nimbus-desktop-experimentsTesting targeting expression:main/nimbus-desktop-experimentsSSF_updateSessionStoreForStorage equals www.facebook.com (Facebook)
      Source: firefox.exe, 0000000D.00000003.1877966815.000001B27EEFA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1876949736.000001B27FF6E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1870911117.000001B27FF6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.facebook.com equals www.facebook.com (Facebook)
      Source: firefox.exe, 0000000D.00000003.1851137164.000001B289989000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1835768799.000001B289984000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867434969.000001B28998C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: www.youtube.com equals www.youtube.com (Youtube)
      Source: firefox.exe, 0000000D.00000003.1862771632.000001B27EEC6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1877966815.000001B27EEC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871662253.000001B27EEC6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: x*://www.facebook.com/platform/impression.php* equals www.facebook.com (Facebook)
      Source: global trafficDNS traffic detected: DNS query: prod.classify-client.prod.webservices.mozgcp.net
      Source: global trafficDNS traffic detected: DNS query: detectportal.firefox.com
      Source: global trafficDNS traffic detected: DNS query: youtube.com
      Source: global trafficDNS traffic detected: DNS query: prod.detectportal.prod.cloudops.mozgcp.net
      Source: global trafficDNS traffic detected: DNS query: contile.services.mozilla.com
      Source: global trafficDNS traffic detected: DNS query: prod.balrog.prod.cloudops.mozgcp.net
      Source: global trafficDNS traffic detected: DNS query: spocs.getpocket.com
      Source: global trafficDNS traffic detected: DNS query: example.org
      Source: global trafficDNS traffic detected: DNS query: ipv4only.arpa
      Source: global trafficDNS traffic detected: DNS query: prod.ads.prod.webservices.mozgcp.net
      Source: global trafficDNS traffic detected: DNS query: content-signature-2.cdn.mozilla.net
      Source: global trafficDNS traffic detected: DNS query: prod.content-signature-chains.prod.webservices.mozgcp.net
      Source: global trafficDNS traffic detected: DNS query: shavar.services.mozilla.com
      Source: global trafficDNS traffic detected: DNS query: push.services.mozilla.com
      Source: global trafficDNS traffic detected: DNS query: support.mozilla.org
      Source: global trafficDNS traffic detected: DNS query: us-west1.prod.sumo.prod.webservices.mozgcp.net
      Source: global trafficDNS traffic detected: DNS query: firefox.settings.services.mozilla.com
      Source: global trafficDNS traffic detected: DNS query: telemetry-incoming.r53-2.services.mozilla.com
      Source: global trafficDNS traffic detected: DNS query: prod.remote-settings.prod.webservices.mozgcp.net
      Source: global trafficDNS traffic detected: DNS query: www.youtube.com
      Source: global trafficDNS traffic detected: DNS query: www.facebook.com
      Source: global trafficDNS traffic detected: DNS query: www.wikipedia.org
      Source: global trafficDNS traffic detected: DNS query: star-mini.c10r.facebook.com
      Source: global trafficDNS traffic detected: DNS query: youtube-ui.l.google.com
      Source: global trafficDNS traffic detected: DNS query: dyna.wikimedia.org
      Source: global trafficDNS traffic detected: DNS query: www.reddit.com
      Source: global trafficDNS traffic detected: DNS query: twitter.com
      Source: global trafficDNS traffic detected: DNS query: reddit.map.fastly.net
      Source: global trafficDNS traffic detected: DNS query: services.addons.mozilla.org
      Source: global trafficDNS traffic detected: DNS query: normandy.cdn.mozilla.net
      Source: global trafficDNS traffic detected: DNS query: normandy-cdn.services.mozilla.com
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://127.0.0.1:
      Source: firefox.exe, 0000000D.00000003.1877222215.000001B27FCDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearch/1.0/
      Source: firefox.exe, 0000000D.00000003.1877222215.000001B27FCDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearch/1.1/
      Source: firefox.exe, 0000000D.00000003.1877222215.000001B27FCDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.0/
      Source: firefox.exe, 0000000D.00000003.1877222215.000001B27FCDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a9.com/-/spec/opensearchdescription/1.1/
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842624255.000001B27D08A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
      Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842624255.000001B27D08A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0K
      Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
      Source: firefox.exe, 0000000D.00000003.1828641142.000001B289541000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1877130114.000001B27FF17000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com
      Source: firefox.exe, 0000000D.00000003.1855791089.000001B280C6C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1877330998.000001B27F7F7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/canonical.html
      Source: firefox.exe, 0000000D.00000003.1834047244.000001B27F434000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/canonical.htmlP-
      Source: firefox.exe, 0000000D.00000003.1879362525.000001B27E3B1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834047244.000001B27F434000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1868863251.000001B2893BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862300476.000001B27F434000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871584166.000001B27F436000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860938980.000001B27F7F7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838119619.000001B2893B9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1877330998.000001B27F7F7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv4
      Source: firefox.exe, 0000000D.00000003.1732217190.000001B27EA13000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1877330998.000001B27F7F7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.com/success.txt?ipv6
      Source: firefox.exe, 0000000D.00000003.1839908703.000001B2855A0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://detectportal.firefox.comP
      Source: firefox.exe, 0000000D.00000003.1693603312.000001B274620000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://en.w
      Source: firefox.exe, 0000000D.00000003.1872997000.000001B287C4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-04/schema#
      Source: firefox.exe, 0000000D.00000003.1872997000.000001B287C4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-06/schema#
      Source: firefox.exe, 0000000D.00000003.1872997000.000001B287C4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://json-schema.org/draft-07/schema#-
      Source: firefox.exe, 0000000D.00000003.1872997000.000001B287C4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org
      Source: firefox.exe, 0000000D.00000003.1812858481.000001B280F65000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1790025657.000001B27EDA0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1750300277.000001B27F299000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1748390716.000001B27F2A6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1797159482.000001B27ED9A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1694140971.000001B27E413000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830558766.000001B28568F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1696168637.000001B27D9BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1844639454.000001B27EF43000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1755615640.000001B27F293000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1694238904.000001B27D9E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1800073074.000001B27D9E3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1801518297.000001B280FE4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1694565629.000001B27E477000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1800073074.000001B27D9F5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1826754719.000001B27E468000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1747583915.000001B27F29F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830177686.000001B28584D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1857967681.000001B2800F9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875486785.000001B2800F9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1800929154.000001B285798000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mozilla.org/MPL/2.0/.
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0A
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0C
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.digicert.com0N
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842624255.000001B27D08A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.digicert.com0X
      Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ocsp.thawte.com0
      Source: firefox.exe, 0000000D.00000003.1863546837.000001B27EE6B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1870911117.000001B27FF5F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0
      Source: firefox.exe, 0000000D.00000003.1831755469.000001B280C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0.
      Source: firefox.exe, 0000000D.00000003.1830558766.000001B28568F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.i.lencr.org/0W
      Source: firefox.exe, 0000000D.00000003.1830558766.000001B28568F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1863546837.000001B27EE6B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1870911117.000001B27FF5F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1831755469.000001B280C42000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://r3.o.lencr.org0
      Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
      Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
      Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com/CPS0
      Source: gmpopenh264.dll.tmp.13.drString found in binary or memory: http://www.mozilla.com0
      Source: firefox.exe, 0000000D.00000003.1868908684.000001B287C67000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2005/app-updatex
      Source: firefox.exe, 0000000D.00000003.1877222215.000001B27FCDC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/2006/browser/search/
      Source: firefox.exe, 0000000D.00000003.1842277247.000001B27FB92000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727133097.000001B27FBBF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842179075.000001B27FBBE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860847648.000001B27FB93000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860761018.000001B27FBBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xul
      Source: firefox.exe, 0000000D.00000003.1842277247.000001B27FB92000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860847648.000001B27FB93000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.mozilla.org/keymaster/gatekeeper/there.is.only.xulH
      Source: firefox.exe, 00000010.00000002.3505694156.00000208CC5FD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000003.1722182625.00000208CC5FD000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000003.1723173607.00000208CC5FD000.00000004.00000020.00020000.00000000.sdmp, mozilla-temp-41.13.drString found in binary or memory: http://www.videolan.org/x264.html
      Source: firefox.exe, 0000000D.00000003.1830558766.000001B28568F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1870911117.000001B27FF5F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840301798.000001B28557F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.c.lencr.org/0
      Source: firefox.exe, 0000000D.00000003.1830558766.000001B28568F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1870911117.000001B27FF5F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840301798.000001B28557F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://x1.i.lencr.org/0
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.malware-error.mozilla.com/?url=
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-error.mozilla.com/?url=
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://%LOCALE%.phish-report.mozilla.com/?url=
      Source: firefox.exe, 0000000D.00000003.1682218533.000001B27D41F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682087203.000001B27D200000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682863328.000001B27D477000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682411054.000001B27D43C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682618781.000001B27D45A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ac.duckduckgo.com/ac/
      Source: firefox.exe, 0000000D.00000003.1831755469.000001B280C79000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855791089.000001B280C79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://account.bellmedia.c
      Source: firefox.exe, 0000000D.00000003.1838119619.000001B289382000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com
      Source: firefox.exe, 0000000D.00000003.1830662083.000001B285658000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://accounts.firefox.com/settings/clients
      Source: file.exe, 00000000.00000003.1700869507.0000000001050000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000003.1700968810.0000000001055000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.1702044460.0000000001056000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1755615640.000001B27F2D6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1749582942.000001B27F2D9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1750300277.000001B27F2D9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1815021421.000001B27F6B3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1787227300.000001B27F6B3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1809328299.000001B27F2D8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1820085087.000001B27F6B6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1835989768.000001B289563000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1797949384.000001B27F2D6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1859390567.000001B289563000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1784666760.000001B27F2D6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1852821161.000001B289563000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1818294540.000001B27F2D9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1750011024.000001B27F2D9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1820174875.000001B27E812000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1753741487.000001B27F6B7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://accounts.google.com/v3/signin/challenge/pwd
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/language-tools/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search-engines/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/search?q=%TERMS%&platform=%OS%&appver=%VERSION%
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://addons.mozilla.org/%LOCALE%/firefox/themes
      Source: firefox.exe, 0000000D.00000003.1834047244.000001B27F42D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862581397.000001B27F42D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads-us.rd.linksynergy.com/as.php
      Source: firefox.exe, 0000000D.00000003.1877966815.000001B27EEFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ads.stickyadstv.com/firefox-etp
      Source: firefox.exe, 0000000D.00000003.1732217190.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://allegro.pl/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://api.accounts.firefox.com/v1
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/app/firefox-private-safe-browser/id989804926
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://apps.apple.com/us/app/firefox-private-network-vpn/id1489407738
      Source: firefox.exe, 0000000D.00000003.1727854227.000001B27EA41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org
      Source: firefox.exe, 0000000D.00000003.1727854227.000001B27EA41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/GMP/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL%/%OS_VER
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/3/SystemAddons/%VERSION%/%BUILD_ID%/%BUILD_TARGET%/%LOCALE%/%CHANNEL
      Source: firefox.exe, 0000000D.00000003.1859597777.000001B2893F7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1837547844.000001B2893F7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1868707692.000001B2893F7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840301798.000001B28558B000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1829338860.000001B285854000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aus5.mozilla.org/update/6/Firefox/118.0.1/20230927232528/WINNT_x86_64-msvc-x64/en-US/release
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://blocked.cdn.mozilla.net/%blockID%.html
      Source: firefox.exe, 0000000F.00000002.3501268145.000001CE2F3E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB8F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3504397774.0000022B65503000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
      Source: firefox.exe, 0000000F.00000002.3501268145.000001CE2F3E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB8F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3504397774.0000022B65503000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
      Source: firefox.exe, 0000000D.00000003.1870744529.000001B27FFA2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mo
      Source: firefox.exe, 0000000D.00000003.1785858569.000001B27E234000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1755964992.000001B27E888000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1756347001.000001B27E8A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1189266
      Source: firefox.exe, 0000000D.00000003.1785858569.000001B27E234000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1755964992.000001B27E888000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1756347001.000001B27E8A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1193802
      Source: firefox.exe, 0000000D.00000003.1755964992.000001B27E888000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1756347001.000001B27E8A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1207993
      Source: firefox.exe, 0000000D.00000003.1755964992.000001B27E888000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1266220
      Source: firefox.exe, 0000000D.00000003.1785858569.000001B27E234000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1755964992.000001B27E888000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1756347001.000001B27E8A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1283601
      Source: firefox.exe, 0000000D.00000003.1830662083.000001B285664000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1539075
      Source: firefox.exe, 0000000D.00000003.1830662083.000001B285664000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1584464
      Source: firefox.exe, 0000000D.00000003.1830662083.000001B285664000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1607439
      Source: firefox.exe, 0000000D.00000003.1830662083.000001B285664000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1616739
      Source: firefox.exe, 0000000D.00000003.1785858569.000001B27E234000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1755964992.000001B27E888000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1756347001.000001B27E8A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=1678448
      Source: firefox.exe, 0000000D.00000003.1785858569.000001B27E234000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1755964992.000001B27E888000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1756347001.000001B27E8A8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=792480
      Source: firefox.exe, 0000000D.00000003.1755964992.000001B27E888000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=809550
      Source: firefox.exe, 0000000D.00000003.1755964992.000001B27E888000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://bugzilla.mozilla.org/show_bug.cgi?id=840161
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f
      Source: firefox.exe, 0000000D.00000003.1839289601.000001B285BB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://completion.amazon.com/search/complete?q=
      Source: firefox.exe, 0000000D.00000003.1864070228.000001B27EA83000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://content-signature-2.cdn.mozilla.net/chains/remote-settings.content-signature.mozilla.org-202
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://content.cdn.mozilla.net
      Source: firefox.exe, 0000000F.00000002.3501268145.000001CE2F3E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB8F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3504397774.0000022B65503000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
      Source: firefox.exe, 0000000F.00000002.3501268145.000001CE2F3E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB8F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3504397774.0000022B65503000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
      Source: firefox.exe, 0000000D.00000003.1839289601.000001B285BB0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com
      Source: firefox.exe, 0000000D.00000003.1853761116.000001B285C0B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/
      Source: firefox.exe, 0000000D.00000003.1732217190.000001B27EA13000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://contile.services.mozilla.com/v1/tiles
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://coverage.mozilla.org
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://crash-stats.mozilla.org/report/index/
      Source: firefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://crbug.com/993268
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://dap-02.api.divviup.org
      Source: firefox.exe, 0000000D.00000003.1785070384.000001B27E86E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1866759431.000001B27F3C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834047244.000001B27F42D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834476954.000001B27F3C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865984890.000001B27F3C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://datastudio.google.com/embed/reporting/
      Source: firefox.exe, 0000000D.00000003.1827159019.000001B289AA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc
      Source: firefox.exe, 0000000D.00000003.1850045006.000001B289AA7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1827159019.000001B289AA0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1827159019.000001B289AA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture
      Source: firefox.exe, 0000000D.00000003.1827159019.000001B289AA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Element/setPointerCaptureElementReleaseCaptureWarning
      Source: firefox.exe, 0000000D.00000003.1827159019.000001B289AA9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1850045006.000001B289AA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/docs/Web/API/Push_API/Using_the_Push_API#EncryptionPreventDefaultFromP
      Source: firefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/API/ElementCSSInlineStyle/style#setting_styles)
      Source: firefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/JavaScript/Reference/Statements/for-await...of
      Source: firefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://developers.google.com/safe-browsing/v4/advisory
      Source: firefox.exe, 0000000D.00000003.1839144576.000001B285BD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/
      Source: firefox.exe, 0000000D.00000003.1728377027.000001B27E066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://duckduckgo.com/y
      Source: firefox.exe, 0000000D.00000003.1686122214.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845953994.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1684724067.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849718392.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1685010408.000001B27CC1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://e.mail.ru/cgi-bin/sentmsg?mailto=%s
      Source: firefox.exe, 0000000D.00000003.1686122214.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845953994.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1684724067.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849718392.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1685010408.000001B27CC1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://email.seznam.cz/newMessageScreen?mailto=%s
      Source: firefox.exe, 0000000D.00000003.1850045006.000001B289AA7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1827159019.000001B289AA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://extensionworkshop.com/documentation/publish/self-distribution/
      Source: firefox.exe, 0000000D.00000003.1831204762.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1874454783.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869643643.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB812000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B65313000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-api-proxy.cdn.mozilla.net/
      Source: firefox.exe, 0000000D.00000003.1729529242.000001B287DCA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728696574.000001B27EB37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox-settings-attachments.cdn.mozilla.net/main-workspace/ms-images/706c7a85-cf23-442e-8a9
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://firefox-source-docs.mozilla.org/networking/dns/trr-skip-reasons.html#
      Source: firefox.exe, 0000000D.00000003.1829338860.000001B285854000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com
      Source: firefox.exe, 0000000D.00000003.1851265395.000001B2895E5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/
      Source: firefox.exe, 0000000D.00000003.1852821161.000001B289563000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://fpn.firefox.com/browser?utm_source=firefox-desktop&utm_medium=referral&utm_campaign=about-pr
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ftp.mozilla.org/pub/labs/devtools/adb-extension/#OS#/adb-extension-latest-#OS#.xpi
      Source: firefox.exe, 0000000D.00000003.1831204762.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1874454783.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869643643.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB812000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B65313000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/
      Source: firefox.exe, 00000010.00000002.3502204331.00000208CB8C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B653C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=
      Source: firefox.exe, 00000010.00000002.3502204331.00000208CB8C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B653C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l
      Source: firefox.exe, 0000000D.00000003.1869643643.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB82F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B65330000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.cdn.mozilla.net/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=bas
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/career?utm_source=pocket-newtabL
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/entertainment?utm_source=pocket-newtabC
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/food?utm_source=pocket-newtabA
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/health?utm_source=pocket-newtabE
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/science?utm_source=pocket-newtabG
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/self-improvement?utm_source=pocket-newtab?
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/technology?utm_source=pocket-newtabN
      Source: firefox.exe, 00000010.00000002.3502204331.00000208CB8C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B653C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tab
      Source: firefox.exe, 0000000D.00000003.1831204762.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1874454783.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869643643.000001B2811AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore/trending?src=fx_new_tabL
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/explore?utm_source=pocket-newtabI
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B45000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/firefox/new_tab_learn_more/
      Source: firefox.exe, 00000010.00000002.3502204331.00000208CB8C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B653C4000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendations
      Source: firefox.exe, 0000000D.00000003.1831204762.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1874454783.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869643643.000001B2811AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS
      Source: firefox.exe, 0000000D.00000003.1831204762.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1874454783.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869643643.000001B2811AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/recommendationsS7
      Source: firefox.exe, 0000000D.00000003.1831204762.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1874454783.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869643643.000001B2811AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://getpocket.com/v3/newtab/layout?version=1&consumer_key=$apiKey&layout_variant=basic
      Source: firefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/google/closure-compiler/issues/3177
      Source: firefox.exe, 0000000D.00000003.1723712968.000001B28573E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query-all.ts
      Source: firefox.exe, 0000000D.00000003.1723712968.000001B28573E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/blob/main/packages/reactive-element/src/decorators/query.ts
      Source: firefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/lit/lit/issues/1266
      Source: firefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/microsoft/TypeScript/issues/338).
      Source: firefox.exe, 0000000D.00000003.1682218533.000001B27D41F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682087203.000001B27D200000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682863328.000001B27D477000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682411054.000001B27D43C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682618781.000001B27D45A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/mozilla-services/screenshots
      Source: firefox.exe, 0000000D.00000003.1867481628.000001B28990C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/uuidjs/uuid#getrandomvalues-not-supported
      Source: firefox.exe, 0000000D.00000003.1830662083.000001B285664000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/w3c/csswg-drafts/blob/master/css-grid-2/MASONRY-EXPLAINER.md
      Source: firefox.exe, 0000000D.00000003.1830662083.000001B285664000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/w3c/csswg-drafts/issues/4650
      Source: firefox.exe, 0000000D.00000003.1831204762.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1874454783.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869643643.000001B2811AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/zertosh/loose-envify)
      Source: firefox.exe, 0000000D.00000003.1830662083.000001B285664000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://gpuweb.github.io/gpuweb/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://helper1.dap.cloudflareresearch.com/v02
      Source: firefox.exe, 0000000D.00000003.1865984890.000001B27F3F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834476954.000001B27F3EF000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1785070384.000001B27E86E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1752303703.000001B27F58F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://ib.absa.co.za/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://ideas.mozilla.org/
      Source: firefox.exe, 0000000D.00000003.1871584166.000001B27F45F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862300476.000001B27F45F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834047244.000001B27F45F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/oldsyncS
      Source: firefox.exe, 0000000D.00000003.1834047244.000001B27F47F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871360726.000001B27F489000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862300476.000001B27F47F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/apps/relay
      Source: firefox.exe, 0000000D.00000003.1871584166.000001B27F45F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862300476.000001B27F45F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834047244.000001B27F45F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/H
      Source: firefox.exe, 0000000D.00000003.1871584166.000001B27F45F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862300476.000001B27F45F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834047244.000001B27F45F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/cmd/HCX
      Source: firefox.exe, 0000000D.00000003.1871584166.000001B27F45F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862300476.000001B27F45F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834047244.000001B27F45F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryU
      Source: firefox.exe, 0000000D.00000003.1871584166.000001B27F45F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862300476.000001B27F45F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834047244.000001B27F45F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://identity.mozilla.com/ids/ecosystem_telemetryUFj
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://img-getpocket.cdn.mozilla.net/X
      Source: prefs-1.js.13.drString found in binary or memory: https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
      Source: firefox.exe, 0000000D.00000003.1860800185.000001B27FBA1000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org
      Source: firefox.exe, 00000010.00000002.3502204331.00000208CB886000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B653F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit
      Source: firefox.exe, 0000000D.00000003.1841608424.000001B27FFE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/events/1/bd19c581-276f-4d91-8169-85777
      Source: firefox.exe, 0000000D.00000003.1828083866.000001B2895C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/firefox-desktop/metrics/1/9b763f34-639f-46cc-9a42-6ebb
      Source: firefox.exe, 0000000D.00000003.1851137164.000001B289989000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1835768799.000001B289984000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867434969.000001B28998C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833958651.000001B27F4C3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1861910275.000001B27F4D2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/767a0d42-7c60-41d8
      Source: firefox.exe, 0000000D.00000003.1851137164.000001B289989000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1861910275.000001B27F4D0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1835768799.000001B289984000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1867434969.000001B28998C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833958651.000001B27F4C3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submit/messaging-system/undesired-events/1/ef238b29-f3f7-48e7
      Source: firefox.exe, 0000000D.00000003.1831204762.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1874454783.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869643643.000001B2811AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://incoming.telemetry.mozilla.org/submits
      Source: firefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://infra.spec.whatwg.org/#ascii-whitespace
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://install.mozilla.org
      Source: firefox.exe, 0000000D.00000003.1728377027.000001B27E066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema
      Source: firefox.exe, 0000000D.00000003.1872997000.000001B287C4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema.
      Source: firefox.exe, 0000000D.00000003.1872997000.000001B287C4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2019-09/schema./
      Source: firefox.exe, 0000000D.00000003.1872997000.000001B287C4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/
      Source: firefox.exe, 0000000D.00000003.1872997000.000001B287C4D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://json-schema.org/draft/2020-12/schema/=
      Source: firefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/libraries/standalone-templates/#rendering-lit-html-templates
      Source: firefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/directives/#stylemap
      Source: firefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lit.dev/docs/templates/expressions/#child-expressions)
      Source: firefox.exe, 0000000D.00000003.1732217190.000001B27EA13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=%MOZILLA_API_KEY%
      Source: firefox.exe, 0000000D.00000003.1732217190.000001B27EA13000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://location.services.mozilla.com/v1/country?key=7e40f68c-7938-4c5d-9f95-e61647c213eb
      Source: firefox.exe, 0000000D.00000003.1831755469.000001B280C79000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855791089.000001B280C79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.live.com
      Source: firefox.exe, 0000000D.00000003.1831755469.000001B280C79000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855791089.000001B280C79000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1859939258.000001B28023E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://login.microsoftonline.com
      Source: firefox.exe, 0000000D.00000003.1785070384.000001B27E86E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834047244.000001B27F42D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862581397.000001B27F42D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://lookerstudio.google.com/embed/reporting/
      Source: firefox.exe, 0000000D.00000003.1686122214.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845953994.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1684724067.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849718392.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1685010408.000001B27CC1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.google.com/mail/?extsrc=mailto&url=%s
      Source: firefox.exe, 0000000D.00000003.1686122214.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845953994.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1684724067.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849718392.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1685010408.000001B27CC1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.inbox.lv/compose?to=%s
      Source: firefox.exe, 0000000D.00000003.1686122214.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845953994.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1684724067.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849718392.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1685010408.000001B27CC1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mail.yahoo.co.jp/compose/?To=%s
      Source: firefox.exe, 00000010.00000002.3502204331.00000208CB886000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B6538F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://merino.services.mozilla.com/api/v1/suggest
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mitmdetection.services.mozilla.com/
      Source: firefox.exe, 0000000D.00000003.1747864890.000001B27F29C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://mochitest.youtube.com/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/about
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/breach-details/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/breach-stats?includeResolved=true
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/dashboard
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://monitor.firefox.com/user/preferences
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla-ohttp-fakespot.fastly-edge.com/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://mozilla.cloudflare-dns.com/dns-query
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D07F000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://mozilla.org0/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://normandy.cdn.mozilla.net/api/v1
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://oauth.accounts.firefox.com/v1
      Source: firefox.exe, 0000000D.00000003.1686122214.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845953994.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1684724067.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849718392.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1685010408.000001B27CC1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://outlook.live.com/default.aspx?rru=compose&to=%s
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_r
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-
      Source: firefox.exe, 0000000D.00000003.1747583915.000001B27F29F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1748390716.000001B27F29C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1750300277.000001B27F29C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1747864890.000001B27F29C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://play.hbomax.com/page/
      Source: firefox.exe, 0000000D.00000003.1747583915.000001B27F29F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1748390716.000001B27F29C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1750300277.000001B27F29C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1747864890.000001B27F29C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://play.hbomax.com/player/
      Source: firefox.exe, 0000000D.00000003.1686122214.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845953994.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1684724067.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849718392.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1685010408.000001B27CC1F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://poczta.interia.pl/mh/?mailto=%s
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://prod.ohttp-gateway.prod.webservices.mozgcp.net/ohttp-configs
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profile.accounts.firefox.com/v1
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://profiler.firefox.com
      Source: firefox.exe, 0000000D.00000003.1841608424.000001B27FFE3000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.services.mozilla.com
      Source: firefox.exe, 0000000D.00000003.1842228424.000001B27FBA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://push.services.mozilla.com/
      Source: firefox.exe, 0000000D.00000003.1869643643.000001B2811AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://redux.js.org/api-reference/store#subscribe(listener)
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/accounts/profile/?utm_medium=firefox-desktop&utm_source=modal&utm_campaign
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://relay.firefox.com/api/v1/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/diagnostic?site=
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%
      Source: firefox.exe, 0000000D.00000003.1840301798.000001B28558B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/downloads?client=SAFEBROWSING_ID&appver=118.0&pver=2.2&
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.google.com/safebrowsing/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&p
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=%GOOGLE_SAFEBR
      Source: firefox.exe, 0000000D.00000003.1840301798.000001B28558B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/fullHashes:find?$ct=application/x-protobuf&key=AIzaSyC7jsptDS
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatHits?$ct=application/x-protobuf&key=%GOOGLE_SAFEBROWSIN
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=%GOOGL
      Source: firefox.exe, 0000000D.00000003.1840301798.000001B28558B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://safebrowsing.googleapis.com/v4/threatListUpdates:fetch?$ct=application/x-protobuf&key=AIzaSy
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://sb-ssl.google.com/safebrowsing/clientreport/download?key=%GOOGLE_SAFEBROWSING_API_KEY%
      Source: firefox.exe, 0000000D.00000003.1682618781.000001B27D45A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://screenshots.firefox.com/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/abuse/report/addon/
      Source: firefox.exe, 0000000D.00000003.1860938980.000001B27F765000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/addon/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/language-tools/?app=firefox&type=language&appversi
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v4/discovery/?lang=%LOCALE%&edition=%DISTRIBUTION%
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%
      Source: firefox.exe, 0000000D.00000003.1879362525.000001B27E3B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/downloads?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://shavar.services.mozilla.com/gethash?client=SAFEBROWSING_ID&appver=%MAJOR_VERSION%&pver=2.2
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://snippets.cdn.mozilla.net/%STARTPAGE_VERSION%/%NAME%/%VERSION%/%APPBUILDID%/%BUILD_TARGET%/%L
      Source: firefox.exe, 0000000D.00000003.1853761116.000001B285C60000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com
      Source: firefox.exe, 0000000D.00000003.1857967681.000001B280048000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB812000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B65313000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/
      Source: firefox.exe, 0000000D.00000003.1857967681.000001B280048000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/spocs#l
      Source: firefox.exe, 00000011.00000002.3501797157.0000022B653F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://spocs.getpocket.com/user
      Source: firefox.exe, 0000000D.00000003.1877966815.000001B27EEFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-js
      Source: firefox.exe, 0000000D.00000003.1877966815.000001B27EEFA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://static.adsafeprotected.com/firefox-etp-pixel
      Source: firefox.exe, 0000000D.00000003.1863706355.000001B27ECD9000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.13.drString found in binary or memory: https://support.mozilla.org
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cryptominers-report
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/firefox-relay-integration
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/search-engine-removal
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report
      Source: firefox.exe, 0000000D.00000003.1868863251.000001B2893BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838119619.000001B2893B9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/
      Source: firefox.exe, 0000000D.00000003.1864070228.000001B27EA7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EA7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/1/firefox/118.0.1/WINNT/en-US/firefox-relay-integration
      Source: firefox.exe, 0000000D.00000003.1876585024.000001B27FF80000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1841608424.000001B27FF83000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1863625886.000001B27ECE6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1833958651.000001B27F4E0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1860237964.000001B27FF80000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1877777976.000001B27F4E0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1861910275.000001B27F4E0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/captive-portal
      Source: firefox.exe, 0000000D.00000003.1863706355.000001B27EC9D000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.13.drString found in binary or memory: https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
      Source: firefox.exe, 0000000D.00000003.1802505903.000001B2801AA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings
      Source: firefox.exe, 0000000D.00000003.1875282782.000001B280C8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1831755469.000001B280C86000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855791089.000001B280C86000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2
      Source: places.sqlite-wal.13.drString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.
      Source: firefox.exe, 0000000D.00000003.1863706355.000001B27EC9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
      Source: firefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tc39.github.io/ecma262/#sec-typeof-operator
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://token.services.mozilla.com/1.0/sync/1.5
      Source: firefox.exe, 0000000D.00000003.1827159019.000001B289AA9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1850045006.000001B289AA7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1827159019.000001B289AA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-2
      Source: firefox.exe, 0000000D.00000003.1850045006.000001B289AA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-3.1
      Source: firefox.exe, 0000000D.00000003.1850045006.000001B289AA7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1827159019.000001B289AA0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/draft-ietf-httpbis-encryption-encoding-02#section-4
      Source: firefox.exe, 0000000D.00000003.1850045006.000001B289AA7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://tools.ietf.org/html/rfc7515#appendix-C)
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://topsites.services.mozilla.com/cid/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://tracking-protection-issues.herokuapp.com/new
      Source: firefox.exe, 0000000D.00000003.1839144576.000001B285BD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://twitter.com/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-%CHANNEL%-browser&utm_campaig
      Source: firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://vpn.mozilla.org/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campaign=about-pr
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webcompat.com/issues/new
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://webextensions.settings.services.mozilla.com/v1
      Source: firefox.exe, 0000000D.00000003.1831204762.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1874454783.000001B2811AE000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1869643643.000001B2811AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://webpack.js.org/concepts/mode/)
      Source: firefox.exe, 0000000D.00000003.1732217190.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://weibo.com/
      Source: firefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://wicg.github.io/construct-stylesheets/#using-constructed-stylesheets).
      Source: firefox.exe, 0000000D.00000003.1728377027.000001B27E066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.aliexpress.com/
      Source: firefox.exe, 0000000D.00000003.1732217190.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728377027.000001B27E066000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.co.uk/
      Source: firefox.exe, 0000000D.00000003.1839144576.000001B285BD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/
      Source: firefox.exe, 0000000F.00000002.3501268145.000001CE2F3E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB8F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3504397774.0000022B65503000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
      Source: firefox.exe, 0000000D.00000003.1839144576.000001B285BD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/exec/obidos/external-search/
      Source: firefox.exe, 0000000D.00000003.1732217190.000001B27EA84000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozill
      Source: firefox.exe, 0000000D.00000003.1732217190.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.avito.ru/
      Source: firefox.exe, 0000000D.00000003.1732217190.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.bbc.co.uk/
      Source: firefox.exe, 0000000D.00000003.1842840166.000001B27D087000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1842695971.000001B27D086000.00000004.00000020.00020000.00000000.sdmp, gmpopenh264.dll.tmp.13.drString found in binary or memory: https://www.digicert.com/CPS0
      Source: firefox.exe, 0000000F.00000002.3501268145.000001CE2F3E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB8F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3504397774.0000022B65503000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drString found in binary or memory: https://www.expedia.com/?locale=en_US&siteid=1&semcid=US.UB.ADMARKETPLACE.GT-C-EN.HOTEL&SEMDTL=a1219
      Source: firefox.exe, 0000000D.00000003.1840301798.000001B285568000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/
      Source: firefox.exe, 0000000D.00000003.1830662083.000001B285664000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1854644913.000001B28566B000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/
      Source: firefox.exe, 0000000D.00000003.1724051809.000001B285962000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1722004541.000001B285A24000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1721623454.000001B285A22000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search
      Source: firefox.exe, 0000000D.00000003.1682218533.000001B27D41F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682087203.000001B27D200000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682863328.000001B27D477000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682411054.000001B27D43C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682618781.000001B27D45A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/complete/search?client=firefox&q=
      Source: firefox.exe, 0000000D.00000003.1839350695.000001B2856D8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682618781.000001B27D45A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search
      Source: firefox.exe, 0000000D.00000003.1749506540.000001B27F583000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/search?client=firefox-b-d&q=
      Source: firefox.exe, 0000000D.00000003.1728377027.000001B27E066000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google.com/searchhttps://www.google.com/searchFirefoxSpecificPropertiesWebExtensionLangp
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.googleapis.com/geolocation/v1/geolocate?key=%GOOGLE_LOCATION_SERVICE_API_KEY%
      Source: firefox.exe, 0000000D.00000003.1747583915.000001B27F29F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1748390716.000001B27F29C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1750300277.000001B27F29C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1747864890.000001B27F29C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.hulu.com/watch/
      Source: firefox.exe, 0000000D.00000003.1732217190.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.ifeng.com/
      Source: firefox.exe, 0000000D.00000003.1747583915.000001B27F29F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1748390716.000001B27F29C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1750300277.000001B27F29C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1747864890.000001B27F29C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.instagram.com/
      Source: firefox.exe, 0000000D.00000003.1732217190.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.iqiyi.com/
      Source: firefox.exe, 0000000D.00000003.1732217190.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728377027.000001B27E066000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.leboncoin.fr/
      Source: firefox.exe, 0000000D.00000003.1878940716.000001B27E3CE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mobilesuica.com/
      Source: firefox.exe, 0000000D.00000003.1863706355.000001B27ECD9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1839144576.000001B285BC9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1873659627.000001B285BCA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA3A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1829338860.000001B2858B6000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/about/legal/terms/subscription-services/
      Source: firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/releasenotes/?utm_source=firefox-browser&utm_medi
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/%VERSION%/tour/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/geolocation/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/new?reason=manual-update
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/notes
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/set-as-default/thanks/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/firefox/xr/
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/%LOCALE%/privacy/subscription-services/
      Source: places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.
      Source: firefox.exe, 0000000D.00000003.1863706355.000001B27EC9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/gro.allizom.www.VsJpOAWrHqB2
      Source: firefox.exe, 0000000D.00000003.1729529242.000001B287DCA000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728696574.000001B27EB37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/about/legal/terms/mozilla/
      Source: places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.
      Source: firefox.exe, 0000000D.00000003.1863706355.000001B27EC9D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/contribute/gro.allizom.www.n0g9CLHwD9nR
      Source: firefox.exe, 0000000D.00000003.1864070228.000001B27EA7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EA7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/about/legal/terms/subscription-services/
      Source: firefox.exe, 0000000D.00000003.1868863251.000001B2893BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1838119619.000001B2893B9000.00000004.00000800.00020000.00000000.sdmp, targeting.snapshot.json.tmp.13.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/
      Source: firefox.exe, 0000000D.00000003.1863706355.000001B27EC9D000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/en-US/privacy/firefox/Firefox
      Source: firefox.exe, 0000000D.00000003.1864070228.000001B27EA7F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EA7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/en-US/privacy/subscription-services/
      Source: firefox.exe, 0000000D.00000003.1863706355.000001B27EC9D000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/firefox/?utm_medium=firefox-desktop&utm_source=bookmarks-toolbar&utm_campaig
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/android/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/firefox/ios/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_campa
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#crash-reporter
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/legal/privacy/firefox.html#health-report
      Source: firefox.exe, 0000000F.00000002.3501268145.000001CE2F3C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB8C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B653F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/#suggest-relevant-contentP
      Source: firefox.exe, 00000011.00000002.3501797157.0000022B653F6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/:
      Source: firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_c
      Source: firefox.exe, 0000000D.00000003.1725852534.000001B285B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/V
      Source: firefox.exe, 0000000D.00000003.1863706355.000001B27EC9D000.00000004.00000800.00020000.00000000.sdmp, places.sqlite-wal.13.drString found in binary or memory: https://www.mozilla.org/privacy/firefox/gro.allizom.www.
      Source: firefox.exe, 00000010.00000002.3502204331.00000208CB8C7000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.mozilla.org/privacy/firefox/qK
      Source: firefox.exe, 0000000D.00000003.1831755469.000001B280C79000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855791089.000001B280C79000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.msn.com
      Source: firefox.exe, 0000000D.00000003.1839144576.000001B285BD6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.reddit.com/
      Source: firefox.exe, 0000000D.00000003.1869643643.000001B2811FD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1831204762.000001B2811FD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.sling.com/
      Source: firefox.exe, 0000000D.00000003.1785070384.000001B27E86E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1876949736.000001B27FF6E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1870911117.000001B27FF6E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.tiktok.com/
      Source: firefox.exe, 0000000D.00000003.1839144576.000001B285BD6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB80A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B6530C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.youtube.com/
      Source: firefox.exe, 0000000D.00000003.1727133097.000001B27FBC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1727133097.000001B27FBDF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.com
      Source: recovery.jsonlz4.tmp.13.drString found in binary or memory: https://youtube.com/account?=
      Source: firefox.exe, 00000010.00000002.3504845799.00000208CB970000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/sig
      Source: firefox.exe, 00000011.00000002.3501127503.0000022B65170000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/sigX
      Source: firefox.exe, 0000000D.00000003.1727133097.000001B27FBC7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1820174875.000001B27E812000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3504337066.000001CE2F484000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3500495448.000001CE2F0B0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3500495448.000001CE2F0BA000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3500804848.00000208CB60A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3500804848.00000208CB600000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3504845799.00000208CB974000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3500359430.0000022B6501A000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3500359430.0000022B65010000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501127503.0000022B65174000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd
      Source: firefox.exe, 0000000B.00000002.1672311189.000001E8DB477000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000C.00000002.1677767803.000001AC21667000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd--no-default-browser
      Source: firefox.exe, 0000000F.00000002.3504337066.000001CE2F484000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3500495448.000001CE2F0B0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3500804848.00000208CB600000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3504845799.00000208CB974000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3500359430.0000022B65010000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501127503.0000022B65174000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwdMOZ_CRASHREPORTER_RE
      Source: firefox.exe, 0000000D.00000003.1806554334.000001B285ACA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.comB
      Source: firefox.exe, 0000000D.00000003.1806554334.000001B285ACA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://youtube.comh_
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
      Source: unknownNetwork traffic detected: HTTP traffic on port 50061 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
      Source: unknownNetwork traffic detected: HTTP traffic on port 49779 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49785
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49783
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49782
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49781
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49780
      Source: unknownNetwork traffic detected: HTTP traffic on port 49785 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50058
      Source: unknownNetwork traffic detected: HTTP traffic on port 50059 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49746 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49781 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50059
      Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50061
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50060
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 50062
      Source: unknownNetwork traffic detected: HTTP traffic on port 49776 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
      Source: unknownNetwork traffic detected: HTTP traffic on port 49736 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49736
      Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49779
      Source: unknownNetwork traffic detected: HTTP traffic on port 49772 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49778
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49777
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49776
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49772
      Source: unknownNetwork traffic detected: HTTP traffic on port 50060 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49771
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
      Source: unknownNetwork traffic detected: HTTP traffic on port 49967 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49763 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49780 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49806 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49806
      Source: unknownNetwork traffic detected: HTTP traffic on port 49777 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49805
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49804
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49967
      Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49765
      Source: unknownNetwork traffic detected: HTTP traffic on port 49783 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49764
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49763
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49748 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49764 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49805 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
      Source: unknownNetwork traffic detected: HTTP traffic on port 49778 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
      Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49782 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50062 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49754
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 50058 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49765 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49804 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49748
      Source: unknownNetwork traffic detected: HTTP traffic on port 49754 -> 443
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49746
      Source: unknownNetwork traffic detected: HTTP traffic on port 49771 -> 443
      Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49741 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49746 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.160.144.191:443 -> 192.168.2.4:49749 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49758 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49765 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49763 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49769 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49770 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49775 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49776 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 151.101.193.91:443 -> 192.168.2.4:49777 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49781 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49782 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 35.244.181.201:443 -> 192.168.2.4:49780 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.149.100.209:443 -> 192.168.2.4:49783 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49804 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49806 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:49805 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:50062 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:50060 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:50061 version: TLS 1.2
      Source: unknownHTTPS traffic detected: 34.120.208.123:443 -> 192.168.2.4:50059 version: TLS 1.2
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EBEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00EBEAFF
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EBED6A OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00EBED6A
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EBEAFF OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00EBEAFF
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EAAA57 GetKeyboardState,SetKeyboardState,PostMessageW,SendInput,0_2_00EAAA57
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED9576 DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00ED9576

      System Summary

      barindex
      Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.
      Source: file.exe, 00000000.00000000.1638403800.0000000000F02000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e7cc4ffd-e
      Source: file.exe, 00000000.00000000.1638403800.0000000000F02000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_5de4d02b-7
      Source: file.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_bf10a698-8
      Source: file.exeString found in binary or memory: AnyArabicArmenianAvestanBalineseBamumBassa_VahBatakBengaliBopomofoBrahmiBrailleBugineseBuhidCCanadian_AboriginalCarianCaucasian_AlbanianCcCfChakmaChamCherokeeCnCoCommonCopticCsCuneiformCypriotCyrillicDeseretDevanagariDuployanEgyptian_HieroglyphsElbasanEthiopicGeorgianGlagoliticGothicGranthaGreekGujaratiGurmukhiHanHangulHanunooHebrewHiraganaImperial_AramaicInheritedInscriptional_PahlaviInscriptional_ParthianJavaneseKaithiKannadaKatakanaKayah_LiKharoshthiKhmerKhojkiKhudawadiLL&LaoLatinLepchaLimbuLinear_ALinear_BLisuLlLmLoLtLuLycianLydianMMahajaniMalayalamMandaicManichaeanMcMeMeetei_MayekMende_KikakuiMeroitic_CursiveMeroitic_HieroglyphsMiaoMnModiMongolianMroMyanmarNNabataeanNdNew_Tai_LueNkoNlNoOghamOl_ChikiOld_ItalicOld_North_ArabianOld_PermicOld_PersianOld_South_ArabianOld_TurkicOriyaOsmanyaPPahawh_HmongPalmyrenePau_Cin_HauPcPdPePfPhags_PaPhoenicianPiPoPsPsalter_PahlaviRejangRunicSSamaritanSaurashtraScSharadaShavianSiddhamSinhalaSkSmSoSora_SompengSundaneseSyloti_NagriSyriacTagalogTagbanwaTai_LeTai_ThamTai_VietTakriTamilTeluguThaanaThaiTibetanTifinaghTirhutaUgariticVaiWarang_CitiXanXpsXspXucXwdYiZZlZpZsSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBoxSHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_eb28c8fd-c
      Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000208CB6A75F7 NtQuerySystemInformation,16_2_00000208CB6A75F7
      Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000208CB6C60B2 NtQuerySystemInformation,16_2_00000208CB6C60B2
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EAD5EB: CreateFileW,DeviceIoControl,CloseHandle,0_2_00EAD5EB
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00EA1201
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EAE8F6 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00EAE8F6
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E480600_2_00E48060
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB20460_2_00EB2046
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA82980_2_00EA8298
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E7E4FF0_2_00E7E4FF
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E7676B0_2_00E7676B
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED48730_2_00ED4873
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E4CAF00_2_00E4CAF0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E6CAA00_2_00E6CAA0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E5CC390_2_00E5CC39
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E76DD90_2_00E76DD9
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E5D0710_2_00E5D071
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E491C00_2_00E491C0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E5B1190_2_00E5B119
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E613940_2_00E61394
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E617060_2_00E61706
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E6781B0_2_00E6781B
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E619B00_2_00E619B0
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E5997D0_2_00E5997D
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E479200_2_00E47920
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E67A4A0_2_00E67A4A
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E67CA70_2_00E67CA7
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E61C770_2_00E61C77
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E79EEE0_2_00E79EEE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ECBE440_2_00ECBE44
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E61F320_2_00E61F32
      Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000208CB6A75F716_2_00000208CB6A75F7
      Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000208CB6C60B216_2_00000208CB6C60B2
      Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000208CB6C60F216_2_00000208CB6C60F2
      Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000208CB6C67DC16_2_00000208CB6C67DC
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00E5F9F2 appears 31 times
      Source: C:\Users\user\Desktop\file.exeCode function: String function: 00E60A30 appears 46 times
      Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
      Source: classification engineClassification label: mal72.troj.evad.winEXE@34/39@76/12
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB37B5 GetLastError,FormatMessageW,0_2_00EB37B5
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA10BF AdjustTokenPrivileges,CloseHandle,0_2_00EA10BF
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA16C3 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00EA16C3
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB51CD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00EB51CD
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EAD4DC CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,CloseHandle,0_2_00EAD4DC
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB648E _wcslen,CoInitialize,CoCreateInstance,CoUninitialize,0_2_00EB648E
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E442A2 CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00E442A2
      Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Mozilla\Firefox\SkeletonUILock-c388d246Jump to behavior
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4948:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6776:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4944:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2004:120:WilError_03
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7032:120:WilError_03
      Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Local\Temp\firefoxJump to behavior
      Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
      Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
      Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
      Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
      Source: C:\Windows\SysWOW64\taskkill.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
      Source: C:\Program Files\Mozilla Firefox\firefox.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT __PATH, ProcessId, CSName, Caption, SessionId, ThreadCount, WorkingSetSize, KernelModeTime, UserModeTime, ParentProcessId FROM Win32_Process
      Source: C:\Program Files\Mozilla Firefox\firefox.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
      Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: firefox.exe, 0000000D.00000003.1838119619.000001B289395000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE timestamp BETWEEN date(:dateFrom) AND date(:dateTo);
      Source: firefox.exe, 0000000D.00000003.1838119619.000001B289395000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE events (id INTEGER PRIMARY KEY, type INTEGER NOT NULL, count INTEGER NOT NULL, timestamp DATE );
      Source: firefox.exe, 0000000D.00000003.1838119619.000001B289395000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: INSERT INTO events (type, count, timestamp) VALUES (:type, 1, date(:date));
      Source: firefox.exe, 0000000D.00000003.1838119619.000001B289395000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;
      Source: firefox.exe, 0000000D.00000003.1838119619.000001B289395000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT timestamp FROM events ORDER BY timestamp ASC LIMIT 1;;Fy6
      Source: firefox.exe, 0000000D.00000003.1838119619.000001B289395000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: UPDATE events SET count = count + 1 WHERE id = :id;-
      Source: firefox.exe, 0000000D.00000003.1838119619.000001B289395000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9'
      Source: firefox.exe, 0000000D.00000003.1838119619.000001B289395000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT sum(count) FROM events;9
      Source: firefox.exe, 0000000D.00000003.1838119619.000001B289395000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SELECT * FROM events WHERE type = :type AND timestamp = date(:date);
      Source: file.exeReversingLabs: Detection: 47%
      Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /T
      Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /T
      Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /T
      Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /T
      Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /T
      Source: C:\Windows\SysWOW64\taskkill.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
      Source: unknownProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2308 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b782c814-8c81-47ba-94c2-df392bb2665e} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" 1b26d96f710 socket
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4104 -parentBuildID 20230927232528 -prefsHandle 3944 -prefMapHandle 3996 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a411c8dc-255d-4563-a475-6fb43a43af83} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" 1b26d97b610 rdd
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5016 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 3760 -prefMapHandle 3756 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd112c45-1629-47bd-a8be-e043aeb3b23d} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" 1b285591d10 utility
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blockingJump to behavior
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2308 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b782c814-8c81-47ba-94c2-df392bb2665e} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" 1b26d96f710 socketJump to behavior
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4104 -parentBuildID 20230927232528 -prefsHandle 3944 -prefMapHandle 3996 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a411c8dc-255d-4563-a475-6fb43a43af83} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" 1b26d97b610 rddJump to behavior
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: C:\Program Files\Mozilla Firefox\firefox.exe "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5016 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 3760 -prefMapHandle 3756 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd112c45-1629-47bd-a8be-e043aeb3b23d} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" 1b285591d10 utilityJump to behavior
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
      Source: C:\Program Files\Mozilla Firefox\firefox.exeProcess created: unknown unknownJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: wsock32.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: version.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: framedynos.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: dbghelp.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: winsta.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeSection loaded: profapi.dllJump to behavior
      Source: Window RecorderWindow detected: More than 3 window changes detected
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
      Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: UMPDC.pdb source: firefox.exe, 0000000D.00000003.1864070228.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878060088.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: wininet.pdb source: firefox.exe, 0000000D.00000003.1864070228.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: sspicli.pdbrasterize_blobs_time source: firefox.exe, 0000000D.00000003.1864070228.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: xWindows.Security.Integrity.pdb source: firefox.exe, 0000000D.00000003.1863025384.000001B27EEAC000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: winsta.pdb source: firefox.exe, 0000000D.00000003.1878468379.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: ktmw32.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: pnrpnsp.pdb source: firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: wshbth.pdb source: firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: WscApi.pdb source: firefox.exe, 0000000D.00000003.1871962334.000001B27EA72000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864070228.000001B27EA72000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: NapiNSP.pdb source: firefox.exe, 0000000D.00000003.1879790335.000001B27D0D0000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: xWindows.StateRepositoryPS.pdb source: firefox.exe, 0000000D.00000003.1864070228.000001B27EA46000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA13000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1872568294.000001B27EA46000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA13000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: xOneCoreUAPCommonProxyStub.pdb source: firefox.exe, 0000000D.00000003.1863025384.000001B27EEAC000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: webauthn.pdbGCTL source: firefox.exe, 0000000D.00000003.1825960687.000001B285E01000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: xul.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: nssckbi.pdb source: firefox.exe, 0000000D.00000003.1864070228.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864070228.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878060088.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: winnsi.pdb source: firefox.exe, 0000000D.00000003.1878468379.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: dcomp.pdb source: firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: CLBCatQ.pdb source: firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: urlmon.pdb source: firefox.exe, 0000000D.00000003.1871962334.000001B27EA72000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864070228.000001B27EA72000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: NapiNSP.pdbUGP source: firefox.exe, 0000000D.00000003.1879790335.000001B27D0D0000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: dnsapi.pdb source: firefox.exe, 0000000D.00000003.1878875950.000001B27E3D5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: userenv.pdb source: firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: nlaapi.pdb source: firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: devobj.pdb source: firefox.exe, 0000000D.00000003.1878468379.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: d3d11.pdb source: firefox.exe, 0000000D.00000003.1871962334.000001B27EA72000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864070228.000001B27EA72000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: dwmapi.pdb source: firefox.exe, 0000000D.00000003.1878468379.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: srvcli.pdb source: firefox.exe, 0000000D.00000003.1864070228.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878060088.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: webauthn.pdb source: firefox.exe, 0000000D.00000003.1825960687.000001B285E01000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: freebl3.pdb source: firefox.exe, 0000000D.00000003.1864070228.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878060088.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EA8C000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: profapi.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: mswsock.pdb source: firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: nsi.pdb source: firefox.exe, 0000000D.00000003.1878875950.000001B27E3D5000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: propsys.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdb source: gmpopenh264.dll.tmp.13.dr
      Source: Binary string: winmm.pdb source: firefox.exe, 0000000D.00000003.1879039054.000001B27E3BB000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: winrnr.pdb source: firefox.exe, 0000000D.00000003.1878468379.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: msctf.pdb source: firefox.exe, 0000000D.00000003.1878468379.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: version.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: dbgcore.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: mscms.pdb source: firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: twinapi.pdb source: firefox.exe, 0000000D.00000003.1878468379.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA25000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: msasn1.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: z:\task_1551543573\build\openh264\gmpopenh264.pdbV source: gmpopenh264.dll.tmp.13.dr
      Source: Binary string: psapi.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: dbghelp.pdbUrlClassifierStreamUpdater source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: DWrite.pdb source: firefox.exe, 0000000D.00000003.1879270058.000001B27E3B7000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: dxgi.pdb source: firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: ncrypt.pdb source: firefox.exe, 0000000D.00000003.1864070228.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp
      Source: Binary string: sspicli.pdbBackgroundThreadPool #4 source: firefox.exe, 0000000D.00000003.1864070228.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871962334.000001B27EAF8000.00000004.00000800.00020000.00000000.sdmp
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: file.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E442DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E442DE
      Source: gmpopenh264.dll.tmp.13.drStatic PE information: section name: .rodata
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E60A76 push ecx; ret 0_2_00E60A89
      Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpJump to dropped file
      Source: C:\Program Files\Mozilla Firefox\firefox.exeFile created: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)Jump to dropped file
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E5F98E GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00E5F98E
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00ED1C41 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00ED1C41
      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\file.exeStalling execution: Execution stalls by calling Sleepgraph_0-93037
      Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000208CB6A75F7 rdtsc 16_2_00000208CB6A75F7
      Source: C:\Users\user\Desktop\file.exeAPI coverage: 3.8 %
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EADBBE lstrlenW,GetFileAttributesW,FindFirstFileW,FindClose,0_2_00EADBBE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB68EE FindFirstFileW,FindClose,0_2_00EB68EE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB698F FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,FileTimeToSystemTime,FileTimeToSystemTime,0_2_00EB698F
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EAD076 FindFirstFileW,DeleteFileW,DeleteFileW,MoveFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EAD076
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EAD3A9 FindFirstFileW,DeleteFileW,FindNextFileW,FindClose,FindClose,0_2_00EAD3A9
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB9642 SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EB9642
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB979D SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00EB979D
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB9B2B FindFirstFileW,Sleep,FindNextFileW,FindClose,0_2_00EB9B2B
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB5C97 FindFirstFileW,FindNextFileW,FindClose,0_2_00EB5C97
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E442DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E442DE
      Source: firefox.exe, 00000010.00000002.3505163417.00000208CBFB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWf!
      Source: firefox.exe, 00000010.00000002.3500804848.00000208CB60A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWpG
      Source: firefox.exe, 0000000F.00000002.3505325802.000001CE2F600000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlla/
      Source: firefox.exe, 0000000F.00000002.3505325802.000001CE2F600000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllt
      Source: firefox.exe, 0000000F.00000002.3500495448.000001CE2F0BA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW0
      Source: firefox.exe, 0000000F.00000002.3505325802.000001CE2F600000.00000004.00000020.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3504214365.0000022B65400000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: firefox.exe, 00000010.00000002.3505163417.00000208CBFB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllsi
      Source: firefox.exe, 0000000F.00000002.3504812327.000001CE2F51C000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW : 2 : 34 : 1 : 1 : 0x20026 : 0x8 : %SystemRoot%\system32\mswsock.dll : : 1234191b-4bf7-4ca7-86e0-dfd7c32b5445
      Source: firefox.exe, 00000011.00000002.3500359430.0000022B6501A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW.@e+
      Source: firefox.exe, 00000010.00000002.3505163417.00000208CBFB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllL
      Source: firefox.exe, 00000010.00000002.3505163417.00000208CBFB0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Users\user\Desktop\file.exeProcess information queried: ProcessInformationJump to behavior
      Source: C:\Program Files\Mozilla Firefox\firefox.exeCode function: 16_2_00000208CB6A75F7 rdtsc 16_2_00000208CB6A75F7
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EBEAA2 BlockInput,0_2_00EBEAA2
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E72622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E72622
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E442DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E442DE
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E64CE8 mov eax, dword ptr fs:[00000030h]0_2_00E64CE8
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00EA0B62
      Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Windows\SysWOW64\taskkill.exeProcess token adjusted: DebugJump to behavior
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E72622 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E72622
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E6083F IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00E6083F
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E609D5 SetUnhandledExceptionFilter,0_2_00E609D5
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E60C21 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00E60C21
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA1201 LogonUserW,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcslen,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,GetProcessHeap,HeapFree,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00EA1201
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E82BA5 KiUserCallbackDispatcher,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00E82BA5
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EAB226 SendInput,keybd_event,0_2_00EAB226
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC22DA GetForegroundWindow,GetDesktopWindow,GetWindowRect,mouse_event,GetCursorPos,mouse_event,0_2_00EC22DA
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM chrome.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM msedge.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM opera.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM brave.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\taskkill.exe taskkill /F /IM firefox.exe /TJump to behavior
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA0B62 GetSecurityDescriptorDacl,GetAclInformation,GetLengthSid,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,GetProcessHeap,HeapFree,0_2_00EA0B62
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EA1663 AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00EA1663
      Source: file.exeBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndREMOVEKEYSEXISTSAPPENDblankinfoquestionstopwarning
      Source: file.exeBinary or memory string: Shell_TrayWnd
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E60698 cpuid 0_2_00E60698
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EB8195 GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,0_2_00EB8195
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E9D27A GetUserNameW,0_2_00E9D27A
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E7BB6F _free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00E7BB6F
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00E442DE GetVersionExW,GetCurrentProcess,IsWow64Process,LoadLibraryA,GetProcAddress,GetNativeSystemInfo,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00E442DE

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 00000000.00000003.1700677570.0000000001031000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: file.exe PID: 6728, type: MEMORYSTR
      Source: file.exeBinary or memory string: WIN_81
      Source: file.exeBinary or memory string: WIN_XP
      Source: file.exeBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_11WIN_10WIN_2022WIN_2019WIN_2016WIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\AppearanceUSERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubyte64HKEY_LOCAL_MACHINEHKLMHKEY_CLASSES_ROOTHKCRHKEY_CURRENT_CONFIGHKCCHKEY_CURRENT_USERHKCUHKEY_USERSHKUREG_EXPAND_SZREG_SZREG_MULTI_SZREG_DWORDREG_QWORDREG_BINARYRegDeleteKeyExWadvapi32.dll+.-.\\[\\nrt]|%%|%[-+ 0#]?([0-9]*|\*)?(\.[0-9]*|\.\*)?[hlL]?[diouxXeEfgGs](*UCP)\XISVISIBLEISENABLEDTABLEFTTABRIGHTCURRENTTABSHOWDROPDOWNHIDEDROPDOWNADDSTRINGDELSTRINGFINDSTRINGGETCOUNTSETCURRENTSELECTIONGETCURRENTSELECTIONSELECTSTRINGISCHECKEDCHECKUNCHECKGETSELECTEDGETLINECOUNTGETCURRENTLINEGETCURRENTCOLEDITPASTEGETLINESENDCOMMANDIDGETITEMCOUNTGETSUBITEMCOUNTGETTEXTGETSELECTEDCOUNTISSELECTEDSELECTALLSELECTCLEARSELECTINVERTDESELECTFINDITEMVIEWCHANGEGETTOTALCOUNTCOLLAPSEEXPANDmsctls_statusbar321tooltips_class32%d/%02d/%02dbuttonComboboxListboxSysDateTimePick32SysMonthCal32.icl.exe.dllMsctls_Progress32msctls_trackbar32SysAnimate32msctls_updown32SysTabControl32SysTreeView32SysListView32-----@GUI_DRAGID@GUI_DROPID@GUI_DRAGFILEError text not found (please report)Q\EDEFINEUTF16)UTF)UCP)NO_AUTO_POSSESS)NO_START_OPT)LIMIT_MATCH=LIMIT_RECURSION=CR)LF)CRLF)ANY)ANYCRLF)BSR_ANYCRLF)BSR_UNICODE)argument is not a compiled regular expressionargument not compiled in 16 bit modeinternal error: opcode not recognizedinternal error: missing capturing bracketfailed to get memory
      Source: file.exeBinary or memory string: WIN_XPe
      Source: file.exeBinary or memory string: WIN_VISTA
      Source: file.exeBinary or memory string: WIN_7
      Source: file.exeBinary or memory string: WIN_8

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000003.1700677570.0000000001031000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: file.exe PID: 6728, type: MEMORYSTR
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC1204 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,listen,WSAGetLastError,closesocket,0_2_00EC1204
      Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00EC1806 socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00EC1806
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire Infrastructure2
      Valid Accounts
      1
      Windows Management Instrumentation
      1
      DLL Side-Loading
      1
      Exploitation for Privilege Escalation
      2
      Disable or Modify Tools
      21
      Input Capture
      2
      System Time Discovery
      Remote Services1
      Archive Collected Data
      2
      Ingress Tool Transfer
      Exfiltration Over Other Network Medium1
      System Shutdown/Reboot
      CredentialsDomainsDefault Accounts1
      Native API
      2
      Valid Accounts
      1
      DLL Side-Loading
      1
      Deobfuscate/Decode Files or Information
      LSASS Memory1
      Account Discovery
      Remote Desktop Protocol21
      Input Capture
      12
      Encrypted Channel
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
      Extra Window Memory Injection
      2
      Obfuscated Files or Information
      Security Account Manager2
      File and Directory Discovery
      SMB/Windows Admin Shares3
      Clipboard Data
      2
      Non-Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook2
      Valid Accounts
      1
      DLL Side-Loading
      NTDS16
      System Information Discovery
      Distributed Component Object ModelInput Capture3
      Application Layer Protocol
      Traffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon Script21
      Access Token Manipulation
      1
      Extra Window Memory Injection
      LSA Secrets31
      Security Software Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts2
      Process Injection
      1
      Masquerading
      Cached Domain Credentials3
      Process Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items2
      Valid Accounts
      DCSync1
      Application Window Discovery
      Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job21
      Access Token Manipulation
      Proc Filesystem1
      System Owner/User Discovery
      Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
      Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt2
      Process Injection
      /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet
      behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1546669 Sample: file.exe Startdate: 01/11/2024 Architecture: WINDOWS Score: 72 45 youtube.com 2->45 47 youtube-ui.l.google.com 2->47 49 34 other IPs or domains 2->49 57 Multi AV Scanner detection for submitted file 2->57 59 Yara detected Credential Flusher 2->59 61 Binary is likely a compiled AutoIt script file 2->61 63 2 other signatures 2->63 8 file.exe 2->8         started        11 firefox.exe 1 2->11         started        signatures3 process4 signatures5 65 Binary is likely a compiled AutoIt script file 8->65 67 Found stalling execution ending in API Sleep call 8->67 13 taskkill.exe 1 8->13         started        15 taskkill.exe 1 8->15         started        17 taskkill.exe 1 8->17         started        23 3 other processes 8->23 19 firefox.exe 3 220 11->19         started        process6 dnsIp7 25 conhost.exe 13->25         started        27 conhost.exe 15->27         started        29 conhost.exe 17->29         started        51 youtube.com 142.250.185.78, 443, 49738, 49740 GOOGLEUS United States 19->51 53 prod.detectportal.prod.cloudops.mozgcp.net 34.107.221.82, 49739, 49745, 49751 GOOGLEUS United States 19->53 55 10 other IPs or domains 19->55 41 C:\Users\user\AppData\...\gmpopenh264.dll.tmp, PE32+ 19->41 dropped 43 C:\Users\user\...\gmpopenh264.dll (copy), PE32+ 19->43 dropped 31 firefox.exe 1 19->31         started        33 firefox.exe 1 19->33         started        35 firefox.exe 1 19->35         started        37 conhost.exe 23->37         started        39 conhost.exe 23->39         started        file8 process9

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      file.exe47%ReversingLabsWin32.Trojan.CredentialFlusher
      file.exe100%Joe Sandbox ML
      SourceDetectionScannerLabelLink
      C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)0%ReversingLabs
      C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmp0%ReversingLabs
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_l0%URL Reputationsafe
      https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%0%URL Reputationsafe
      https://datastudio.google.com/embed/reporting/0%URL Reputationsafe
      http://www.mozilla.com00%URL Reputationsafe
      https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.0%URL Reputationsafe
      https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecycl0%URL Reputationsafe
      https://merino.services.mozilla.com/api/v1/suggest0%URL Reputationsafe
      https://json-schema.org/draft/2019-09/schema.0%URL Reputationsafe
      https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protect0%URL Reputationsafe
      https://www.leboncoin.fr/0%URL Reputationsafe
      https://spocs.getpocket.com/spocs0%URL Reputationsafe
      https://completion.amazon.com/search/complete?q=0%URL Reputationsafe
      https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-report0%URL Reputationsafe
      https://ads.stickyadstv.com/firefox-etp0%URL Reputationsafe
      https://identity.mozilla.com/ids/ecosystem_telemetryU0%URL Reputationsafe
      https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tab0%URL Reputationsafe
      https://monitor.firefox.com/breach-details/0%URL Reputationsafe
      https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM0%URL Reputationsafe
      https://services.addons.mozilla.org/api/v4/addons/addon/0%URL Reputationsafe
      https://tracking-protection-issues.herokuapp.com/new0%URL Reputationsafe
      https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-report0%URL Reputationsafe
      https://json-schema.org/draft/2020-12/schema/=0%URL Reputationsafe
      https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-report0%URL Reputationsafe
      https://api.accounts.firefox.com/v10%URL Reputationsafe
      https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullSc0%URL Reputationsafe
      https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protections0%URL Reputationsafe
      https://bugzilla.mozilla.org/show_bug.cgi?id=12836010%URL Reputationsafe
      https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shield0%URL Reputationsafe
      https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=0%URL Reputationsafe
      https://bugzilla.mozilla.org/show_bug.cgi?id=12662200%URL Reputationsafe
      https://bugzilla.mo0%URL Reputationsafe
      https://mitmdetection.services.mozilla.com/0%URL Reputationsafe
      https://static.adsafeprotected.com/firefox-etp-js0%URL Reputationsafe
      https://shavar.services.mozilla.com/0%URL Reputationsafe
      https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapture0%URL Reputationsafe
      https://spocs.getpocket.com/0%URL Reputationsafe
      https://services.addons.mozilla.org/api/v4/abuse/report/addon/0%URL Reputationsafe
      https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%0%URL Reputationsafe
      https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-f0%URL Reputationsafe
      https://support.mozilla.org/products/firefoxgro.allizom.troppus.0%URL Reputationsafe
      https://monitor.firefox.com/user/breach-stats?includeResolved=true0%URL Reputationsafe
      https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-report0%URL Reputationsafe
      https://bugzilla.mozilla.org/show_bug.cgi?id=15844640%URL Reputationsafe
      http://a9.com/-/spec/opensearch/1.0/0%URL Reputationsafe
      https://safebrowsing.google.com/safebrowsing/diagnostic?site=0%URL Reputationsafe
      https://monitor.firefox.com/user/dashboard0%URL Reputationsafe
      https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_ID0%URL Reputationsafe
      https://monitor.firefox.com/about0%URL Reputationsafe
      https://account.bellmedia.c0%URL Reputationsafe
      https://login.microsoftonline.com0%URL Reputationsafe
      https://coverage.mozilla.org0%URL Reputationsafe
      http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
      http://x1.c.lencr.org/00%URL Reputationsafe
      http://x1.i.lencr.org/00%URL Reputationsafe
      http://a9.com/-/spec/opensearch/1.1/0%URL Reputationsafe
      https://infra.spec.whatwg.org/#ascii-whitespace0%URL Reputationsafe
      https://blocked.cdn.mozilla.net/0%URL Reputationsafe
      https://json-schema.org/draft/2019-09/schema0%URL Reputationsafe
      https://profiler.firefox.com0%URL Reputationsafe
      https://outlook.live.com/default.aspx?rru=compose&to=%s0%URL Reputationsafe
      https://identity.mozilla.com/apps/relay0%URL Reputationsafe
      https://mozilla.cloudflare-dns.com/dns-query0%URL Reputationsafe
      https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings20%URL Reputationsafe
      https://bugzilla.mozilla.org/show_bug.cgi?id=16784480%URL Reputationsafe
      https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg0%URL Reputationsafe
      https://contile.services.mozilla.com/v1/tiles0%URL Reputationsafe
      https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/0%URL Reputationsafe
      https://monitor.firefox.com/user/preferences0%URL Reputationsafe
      https://screenshots.firefox.com/0%URL Reputationsafe
      https://gpuweb.github.io/gpuweb/0%URL Reputationsafe
      http://json-schema.org/draft-07/schema#-0%URL Reputationsafe
      https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-report0%URL Reputationsafe
      NameIPActiveMaliciousAntivirus DetectionReputation
      example.org
      93.184.215.14
      truefalse
        unknown
        star-mini.c10r.facebook.com
        157.240.251.35
        truefalse
          unknown
          prod.classify-client.prod.webservices.mozgcp.net
          35.190.72.216
          truefalse
            unknown
            prod.balrog.prod.cloudops.mozgcp.net
            35.244.181.201
            truefalse
              unknown
              twitter.com
              104.244.42.129
              truefalse
                unknown
                prod.detectportal.prod.cloudops.mozgcp.net
                34.107.221.82
                truefalse
                  unknown
                  services.addons.mozilla.org
                  151.101.193.91
                  truefalse
                    unknown
                    dyna.wikimedia.org
                    185.15.59.224
                    truefalse
                      unknown
                      prod.remote-settings.prod.webservices.mozgcp.net
                      34.149.100.209
                      truefalse
                        unknown
                        contile.services.mozilla.com
                        34.117.188.166
                        truefalse
                          unknown
                          youtube.com
                          142.250.185.78
                          truefalse
                            unknown
                            prod.content-signature-chains.prod.webservices.mozgcp.net
                            34.160.144.191
                            truefalse
                              unknown
                              youtube-ui.l.google.com
                              142.250.185.110
                              truefalse
                                unknown
                                us-west1.prod.sumo.prod.webservices.mozgcp.net
                                34.149.128.2
                                truefalse
                                  unknown
                                  reddit.map.fastly.net
                                  151.101.1.140
                                  truefalse
                                    unknown
                                    ipv4only.arpa
                                    192.0.0.170
                                    truefalse
                                      unknown
                                      prod.ads.prod.webservices.mozgcp.net
                                      34.117.188.166
                                      truefalse
                                        unknown
                                        push.services.mozilla.com
                                        34.107.243.93
                                        truefalse
                                          unknown
                                          normandy-cdn.services.mozilla.com
                                          35.201.103.21
                                          truefalse
                                            unknown
                                            telemetry-incoming.r53-2.services.mozilla.com
                                            34.120.208.123
                                            truefalse
                                              unknown
                                              www.reddit.com
                                              unknown
                                              unknownfalse
                                                unknown
                                                spocs.getpocket.com
                                                unknown
                                                unknownfalse
                                                  unknown
                                                  content-signature-2.cdn.mozilla.net
                                                  unknown
                                                  unknownfalse
                                                    unknown
                                                    support.mozilla.org
                                                    unknown
                                                    unknownfalse
                                                      unknown
                                                      firefox.settings.services.mozilla.com
                                                      unknown
                                                      unknownfalse
                                                        unknown
                                                        www.youtube.com
                                                        unknown
                                                        unknownfalse
                                                          unknown
                                                          www.facebook.com
                                                          unknown
                                                          unknownfalse
                                                            unknown
                                                            detectportal.firefox.com
                                                            unknown
                                                            unknownfalse
                                                              unknown
                                                              normandy.cdn.mozilla.net
                                                              unknown
                                                              unknownfalse
                                                                unknown
                                                                shavar.services.mozilla.com
                                                                unknown
                                                                unknownfalse
                                                                  unknown
                                                                  www.wikipedia.org
                                                                  unknown
                                                                  unknownfalse
                                                                    unknown
                                                                    NameSourceMaliciousAntivirus DetectionReputation
                                                                    https://play.google.com/store/apps/details?id=org.mozilla.firefox.vpn&referrer=utm_source%3Dfirefox-firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                      unknown
                                                                      https://getpocket.cdn.mozilla.net/v3/firefox/trending-topics?version=2&consumer_key=$apiKey&locale_lfirefox.exe, 00000010.00000002.3502204331.00000208CB8C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B653C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://services.addons.mozilla.org/api/v5/addons/browser-mappings/?browser=%BROWSER%firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://datastudio.google.com/embed/reporting/firefox.exe, 0000000D.00000003.1785070384.000001B27E86E000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1866759431.000001B27F3C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834047244.000001B27F42D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834476954.000001B27F3C4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1865984890.000001B27F3C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      http://www.mozilla.com0gmpopenh264.dll.tmp.13.drfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.firefox.exe, 0000000F.00000002.3501268145.000001CE2F3E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB8F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3504397774.0000022B65503000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://developer.mozilla.org/en-US/docs/Web/Web_Components/Using_custom_elements#using_the_lifecyclfirefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://merino.services.mozilla.com/api/v1/suggestfirefox.exe, 00000010.00000002.3502204331.00000208CB886000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B6538F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://json-schema.org/draft/2019-09/schema.firefox.exe, 0000000D.00000003.1872997000.000001B287C4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://monitor.firefox.com/oauth/init?entrypoint=protection_report_monitor&utm_source=about-protectfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://www.leboncoin.fr/firefox.exe, 0000000D.00000003.1732217190.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728377027.000001B27E066000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://spocs.getpocket.com/spocsfirefox.exe, 0000000D.00000003.1857967681.000001B280048000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      • URL Reputation: safe
                                                                      unknown
                                                                      https://www.amazon.com/exec/obidos/external-search/?field-keywords=&ie=UTF-8&mode=blended&tag=mozillfirefox.exe, 0000000D.00000003.1732217190.000001B27EA84000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        unknown
                                                                        https://completion.amazon.com/search/complete?q=firefox.exe, 0000000D.00000003.1839289601.000001B285BB0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/social-media-tracking-reportfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://ads.stickyadstv.com/firefox-etpfirefox.exe, 0000000D.00000003.1877966815.000001B27EEFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://identity.mozilla.com/ids/ecosystem_telemetryUfirefox.exe, 0000000D.00000003.1871584166.000001B27F45F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862300476.000001B27F45F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1834047244.000001B27F45F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/send-tabfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://monitor.firefox.com/breach-details/firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                        • URL Reputation: safe
                                                                        unknown
                                                                        https://github.com/w3c/csswg-drafts/issues/4650firefox.exe, 0000000D.00000003.1830662083.000001B285664000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          unknown
                                                                          https://versioncheck-bg.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEMfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                          • URL Reputation: safe
                                                                          unknown
                                                                          https://youtube.comBfirefox.exe, 0000000D.00000003.1806554334.000001B285ACA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            unknown
                                                                            https://www.amazon.com/exec/obidos/external-search/firefox.exe, 0000000D.00000003.1839144576.000001B285BD6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              unknown
                                                                              https://www.msn.comfirefox.exe, 0000000D.00000003.1831755469.000001B280C79000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855791089.000001B280C79000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                unknown
                                                                                https://youtube.comh_firefox.exe, 0000000D.00000003.1806554334.000001B285ACA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  unknown
                                                                                  https://github.com/mozilla-services/screenshotsfirefox.exe, 0000000D.00000003.1682218533.000001B27D41F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682087203.000001B27D200000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682863328.000001B27D477000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682411054.000001B27D43C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682618781.000001B27D45A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    unknown
                                                                                    https://services.addons.mozilla.org/api/v4/addons/addon/firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://tracking-protection-issues.herokuapp.com/newfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/password-manager-reportfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://json-schema.org/draft/2020-12/schema/=firefox.exe, 0000000D.00000003.1872997000.000001B287C4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    • URL Reputation: safe
                                                                                    unknown
                                                                                    https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94firefox.exe, 0000000F.00000002.3501268145.000001CE2F3E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB8F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3504397774.0000022B65503000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                      unknown
                                                                                      https://www.instagram.com/firefox.exe, 0000000D.00000003.1747583915.000001B27F29F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1748390716.000001B27F29C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1750300277.000001B27F29C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1747864890.000001B27F29C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        unknown
                                                                                        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/fingerprinters-reportfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://api.accounts.firefox.com/v1firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                        • URL Reputation: safe
                                                                                        unknown
                                                                                        https://www.amazon.com/firefox.exe, 0000000D.00000003.1839144576.000001B285BD6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                          unknown
                                                                                          https://addons.mozilla.org/%LOCALE%/%APP%/blocked-addon/%addonID%/%addonVersion%/firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                            unknown
                                                                                            https://developer.mozilla.org/docs/Mozilla/Add-ons/WebExtensions/API/tabs/captureTabMozRequestFullScfirefox.exe, 0000000D.00000003.1827159019.000001B289AA0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://monitor.firefox.com/?entrypoint=protection_report_monitor&utm_source=about-protectionsfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                            • URL Reputation: safe
                                                                                            unknown
                                                                                            https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&ctafirefox.exe, 0000000F.00000002.3501268145.000001CE2F3E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB8F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3504397774.0000022B65503000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                              unknown
                                                                                              https://www.youtube.com/firefox.exe, 0000000D.00000003.1839144576.000001B285BD6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB80A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B6530C000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                unknown
                                                                                                https://bugzilla.mozilla.org/show_bug.cgi?id=1283601firefox.exe, 0000000D.00000003.1785858569.000001B27E234000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1755964992.000001B27E888000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1756347001.000001B27E8A8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/shieldfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                • URL Reputation: safe
                                                                                                unknown
                                                                                                https://www.bbc.co.uk/firefox.exe, 0000000D.00000003.1732217190.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  unknown
                                                                                                  https://getpocket.cdn.mozilla.net/v3/firefox/global-recs?version=3&consumer_key=$apiKey&locale_lang=firefox.exe, 00000010.00000002.3502204331.00000208CB8C7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B653C4000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                  • URL Reputation: safe
                                                                                                  unknown
                                                                                                  http://127.0.0.1:firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    unknown
                                                                                                    https://bugzilla.mozilla.org/show_bug.cgi?id=1266220firefox.exe, 0000000D.00000003.1755964992.000001B27E888000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://bugzilla.mofirefox.exe, 0000000D.00000003.1870744529.000001B27FFA2000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    https://mitmdetection.services.mozilla.com/firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                    • URL Reputation: safe
                                                                                                    unknown
                                                                                                    http://detectportal.firefox.comPfirefox.exe, 0000000D.00000003.1839908703.000001B2855A0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      unknown
                                                                                                      https://static.adsafeprotected.com/firefox-etp-jsfirefox.exe, 0000000D.00000003.1877966815.000001B27EEFA000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                      • URL Reputation: safe
                                                                                                      unknown
                                                                                                      https://youtube.com/account?=recovery.jsonlz4.tmp.13.drfalse
                                                                                                        unknown
                                                                                                        https://shavar.services.mozilla.com/firefox.exe, 0000000D.00000003.1879362525.000001B27E3B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://developer.mozilla.org/docs/Web/API/Element/releasePointerCapturefirefox.exe, 0000000D.00000003.1850045006.000001B289AA7000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1827159019.000001B289AA0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1827159019.000001B289AA7000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://spocs.getpocket.com/firefox.exe, 0000000D.00000003.1857967681.000001B280048000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB812000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3501797157.0000022B65313000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://services.addons.mozilla.org/api/v4/abuse/report/addon/firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://services.addons.mozilla.org/api/v4/addons/search/?guid=%IDS%&lang=%LOCALE%firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://color.firefox.com/?utm_source=firefox-browser&utm_medium=firefox-browser&utm_content=theme-ffirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                        • URL Reputation: safe
                                                                                                        unknown
                                                                                                        https://www.iqiyi.com/firefox.exe, 0000000D.00000003.1732217190.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                          unknown
                                                                                                          https://support.mozilla.org/products/firefoxgro.allizom.troppus.places.sqlite-wal.13.drfalse
                                                                                                          • URL Reputation: safe
                                                                                                          unknown
                                                                                                          https://play.google.com/store/apps/details?id=org.mozilla.firefox&referrer=utm_source%3Dprotection_rfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                            unknown
                                                                                                            https://monitor.firefox.com/user/breach-stats?includeResolved=truefirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/cross-site-tracking-reportfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://bugzilla.mozilla.org/show_bug.cgi?id=1584464firefox.exe, 0000000D.00000003.1830662083.000001B285664000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            http://a9.com/-/spec/opensearch/1.0/firefox.exe, 0000000D.00000003.1877222215.000001B27FCDC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://safebrowsing.google.com/safebrowsing/diagnostic?site=firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                            • URL Reputation: safe
                                                                                                            unknown
                                                                                                            https://www.google.com/searchhttps://www.google.com/searchFirefoxSpecificPropertiesWebExtensionLangpfirefox.exe, 0000000D.00000003.1728377027.000001B27E066000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                              unknown
                                                                                                              https://monitor.firefox.com/user/dashboardfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              https://versioncheck.addons.mozilla.org/update/VersionCheck.php?reqVersion=%REQ_VERSION%&id=%ITEM_IDfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              https://monitor.firefox.com/aboutfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                              • URL Reputation: safe
                                                                                                              unknown
                                                                                                              http://mozilla.org/MPL/2.0/.firefox.exe, 0000000D.00000003.1812858481.000001B280F65000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1790025657.000001B27EDA0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1750300277.000001B27F299000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1748390716.000001B27F2A6000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1797159482.000001B27ED9A000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1694140971.000001B27E413000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830558766.000001B28568F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1696168637.000001B27D9BD000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1844639454.000001B27EF43000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1755615640.000001B27F293000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1694238904.000001B27D9E8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1800073074.000001B27D9E3000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1801518297.000001B280FE4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1694565629.000001B27E477000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1800073074.000001B27D9F5000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1826754719.000001B27E468000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1747583915.000001B27F29F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1830177686.000001B28584D000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1857967681.000001B2800F9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1875486785.000001B2800F9000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1800929154.000001B285798000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                unknown
                                                                                                                https://account.bellmedia.cfirefox.exe, 0000000D.00000003.1831755469.000001B280C79000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855791089.000001B280C79000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://login.microsoftonline.comfirefox.exe, 0000000D.00000003.1831755469.000001B280C79000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855791089.000001B280C79000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1859939258.000001B28023E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://coverage.mozilla.orgfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                http://crl.thawte.com/ThawteTimestampingCA.crl0gmpopenh264.dll.tmp.13.drfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                http://x1.c.lencr.org/0firefox.exe, 0000000D.00000003.1830558766.000001B28568F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1870911117.000001B27FF5F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840301798.000001B28557F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                http://x1.i.lencr.org/0firefox.exe, 0000000D.00000003.1830558766.000001B28568F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1870911117.000001B27FF5F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1840301798.000001B28557F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                http://a9.com/-/spec/opensearch/1.1/firefox.exe, 0000000D.00000003.1877222215.000001B27FCDC000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://infra.spec.whatwg.org/#ascii-whitespacefirefox.exe, 0000000D.00000003.1722359329.000001B285758000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://blocked.cdn.mozilla.net/firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://json-schema.org/draft/2019-09/schemafirefox.exe, 0000000D.00000003.1728377027.000001B27E066000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://profiler.firefox.comfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://outlook.live.com/default.aspx?rru=compose&to=%sfirefox.exe, 0000000D.00000003.1686122214.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845953994.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1684724067.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849718392.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1685010408.000001B27CC1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://identity.mozilla.com/apps/relayfirefox.exe, 0000000D.00000003.1834047244.000001B27F47F000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1871360726.000001B27F489000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1862300476.000001B27F47F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://mozilla.cloudflare-dns.com/dns-queryfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://support.mozilla.org/kb/refresh-firefox-reset-add-ons-and-settings2firefox.exe, 0000000D.00000003.1875282782.000001B280C8C000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1831755469.000001B280C86000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1855791089.000001B280C86000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://bugzilla.mozilla.org/show_bug.cgi?id=1678448firefox.exe, 0000000D.00000003.1785858569.000001B27E234000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1755964992.000001B27E888000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1756347001.000001B27E8A8000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                • URL Reputation: safe
                                                                                                                unknown
                                                                                                                https://mail.yahoo.co.jp/compose/?To=%sfirefox.exe, 0000000D.00000003.1686122214.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1845953994.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1684724067.000001B27CC33000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1849718392.000001B27CC39000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1685010408.000001B27CC1F000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                  unknown
                                                                                                                  https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpgfirefox.exe, 0000000F.00000002.3501268145.000001CE2F3E4000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000010.00000002.3502204331.00000208CB8F0000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 00000011.00000002.3504397774.0000022B65503000.00000004.00000800.00020000.00000000.sdmp, prefs-1.js.13.drfalse
                                                                                                                  • URL Reputation: safe
                                                                                                                  unknown
                                                                                                                  https://contile.services.mozilla.com/v1/tilesfirefox.exe, 0000000D.00000003.1732217190.000001B27EA13000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                  • URL Reputation: safe
                                                                                                                  unknown
                                                                                                                  https://www.amazon.co.uk/firefox.exe, 0000000D.00000003.1732217190.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1728377027.000001B27E066000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1864887310.000001B27EA32000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1878468379.000001B27EA32000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    unknown
                                                                                                                    https://firefox.settings.services.mozilla.com/v1/buckets/main/collections/ms-language-packs/records/firefox.exe, 0000000D.00000003.1852821161.000001B289563000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    • URL Reputation: safe
                                                                                                                    unknown
                                                                                                                    https://monitor.firefox.com/user/preferencesfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                    • URL Reputation: safe
                                                                                                                    unknown
                                                                                                                    https://screenshots.firefox.com/firefox.exe, 0000000D.00000003.1682618781.000001B27D45A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                    • URL Reputation: safe
                                                                                                                    unknown
                                                                                                                    https://www.google.com/searchfirefox.exe, 0000000D.00000003.1839350695.000001B2856D8000.00000004.00000800.00020000.00000000.sdmp, firefox.exe, 0000000D.00000003.1682618781.000001B27D45A000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      unknown
                                                                                                                      https://gpuweb.github.io/gpuweb/firefox.exe, 0000000D.00000003.1830662083.000001B285664000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                      • URL Reputation: safe
                                                                                                                      unknown
                                                                                                                      https://relay.firefox.com/api/v1/firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                        unknown
                                                                                                                        http://json-schema.org/draft-07/schema#-firefox.exe, 0000000D.00000003.1872997000.000001B287C4D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                        • URL Reputation: safe
                                                                                                                        unknown
                                                                                                                        https://support.mozilla.org/1/firefox/%VERSION%/%OS%/%LOCALE%/tracking-content-reportfirefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                        • URL Reputation: safe
                                                                                                                        unknown
                                                                                                                        https://topsites.services.mozilla.com/cid/firefox.exe, 0000000F.00000002.3504583677.000001CE2F490000.00000002.10000000.00040000.00000000.sdmp, firefox.exe, 00000010.00000002.3501162494.00000208CB640000.00000002.08000000.00040000.00000000.sdmp, firefox.exe, 00000011.00000002.3501428504.0000022B65180000.00000002.10000000.00040000.00000000.sdmpfalse
                                                                                                                          unknown
                                                                                                                          https://twitter.com/firefox.exe, 0000000D.00000003.1839144576.000001B285BD6000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                                                            unknown
                                                                                                                            • No. of IPs < 25%
                                                                                                                            • 25% < No. of IPs < 50%
                                                                                                                            • 50% < No. of IPs < 75%
                                                                                                                            • 75% < No. of IPs
                                                                                                                            IPDomainCountryFlagASNASN NameMalicious
                                                                                                                            142.250.185.78
                                                                                                                            youtube.comUnited States
                                                                                                                            15169GOOGLEUSfalse
                                                                                                                            34.149.100.209
                                                                                                                            prod.remote-settings.prod.webservices.mozgcp.netUnited States
                                                                                                                            2686ATGS-MMD-ASUSfalse
                                                                                                                            34.107.243.93
                                                                                                                            push.services.mozilla.comUnited States
                                                                                                                            15169GOOGLEUSfalse
                                                                                                                            34.107.221.82
                                                                                                                            prod.detectportal.prod.cloudops.mozgcp.netUnited States
                                                                                                                            15169GOOGLEUSfalse
                                                                                                                            35.244.181.201
                                                                                                                            prod.balrog.prod.cloudops.mozgcp.netUnited States
                                                                                                                            15169GOOGLEUSfalse
                                                                                                                            34.117.188.166
                                                                                                                            contile.services.mozilla.comUnited States
                                                                                                                            139070GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfalse
                                                                                                                            151.101.193.91
                                                                                                                            services.addons.mozilla.orgUnited States
                                                                                                                            54113FASTLYUSfalse
                                                                                                                            35.201.103.21
                                                                                                                            normandy-cdn.services.mozilla.comUnited States
                                                                                                                            15169GOOGLEUSfalse
                                                                                                                            35.190.72.216
                                                                                                                            prod.classify-client.prod.webservices.mozgcp.netUnited States
                                                                                                                            15169GOOGLEUSfalse
                                                                                                                            34.160.144.191
                                                                                                                            prod.content-signature-chains.prod.webservices.mozgcp.netUnited States
                                                                                                                            2686ATGS-MMD-ASUSfalse
                                                                                                                            34.120.208.123
                                                                                                                            telemetry-incoming.r53-2.services.mozilla.comUnited States
                                                                                                                            15169GOOGLEUSfalse
                                                                                                                            IP
                                                                                                                            127.0.0.1
                                                                                                                            Joe Sandbox version:41.0.0 Charoite
                                                                                                                            Analysis ID:1546669
                                                                                                                            Start date and time:2024-11-01 12:39:53 +01:00
                                                                                                                            Joe Sandbox product:CloudBasic
                                                                                                                            Overall analysis duration:0h 7m 43s
                                                                                                                            Hypervisor based Inspection enabled:false
                                                                                                                            Report type:full
                                                                                                                            Cookbook file name:default.jbs
                                                                                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                                                            Run name:Run with higher sleep bypass
                                                                                                                            Number of analysed new started processes analysed:22
                                                                                                                            Number of new started drivers analysed:0
                                                                                                                            Number of existing processes analysed:0
                                                                                                                            Number of existing drivers analysed:0
                                                                                                                            Number of injected processes analysed:0
                                                                                                                            Technologies:
                                                                                                                            • HCA enabled
                                                                                                                            • EGA enabled
                                                                                                                            • AMSI enabled
                                                                                                                            Analysis Mode:default
                                                                                                                            Analysis stop reason:Timeout
                                                                                                                            Sample name:file.exe
                                                                                                                            Detection:MAL
                                                                                                                            Classification:mal72.troj.evad.winEXE@34/39@76/12
                                                                                                                            EGA Information:
                                                                                                                            • Successful, ratio: 40%
                                                                                                                            HCA Information:
                                                                                                                            • Successful, ratio: 94%
                                                                                                                            • Number of executed functions: 42
                                                                                                                            • Number of non-executed functions: 312
                                                                                                                            Cookbook Comments:
                                                                                                                            • Found application associated with file extension: .exe
                                                                                                                            • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                                                                                                                            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                                                                                                            • Excluded IPs from analysis (whitelisted): 54.185.230.140, 35.160.212.113, 52.11.191.138, 142.250.184.238, 2.22.61.56, 2.22.61.59, 172.217.18.14, 142.250.185.202, 216.58.212.138
                                                                                                                            • Excluded domains from analysis (whitelisted): fs.microsoft.com, shavar.prod.mozaws.net, ciscobinary.openh264.org, slscr.update.microsoft.com, otelrules.azureedge.net, incoming.telemetry.mozilla.org, ctldl.windowsupdate.com, a17.rackcdn.com.mdc.edgesuite.net, detectportal.prod.mozaws.net, aus5.mozilla.org, fe3cr.delivery.mp.microsoft.com, a19.dscg10.akamai.net, ocsp.digicert.com, redirector.gvt1.com, safebrowsing.googleapis.com, location.services.mozilla.com
                                                                                                                            • Execution Graph export aborted for target firefox.exe, PID 4828 because there are no executed function
                                                                                                                            • Not all processes where analyzed, report is missing behavior information
                                                                                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                                                                                            • Report size exceeded maximum capacity and may have missing disassembly code.
                                                                                                                            • Report size getting too big, too many NtCreateFile calls found.
                                                                                                                            • Report size getting too big, too many NtOpenFile calls found.
                                                                                                                            • Report size getting too big, too many NtQueryAttributesFile calls found.
                                                                                                                            • Some HTTP raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                                                                                                                            • VT rate limit hit for: file.exe
                                                                                                                            No simulations
                                                                                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                            34.117.188.166file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                              151.101.193.91file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                  34.149.100.209file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                        file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                    34.160.144.191file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                            file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                      services.addons.mozilla.orgfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.129.91
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.193.91
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.1.91
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.65.91
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.65.91
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.193.91
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.1.91
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.129.91
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.65.91
                                                                                                                                                                                                      example.orgfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                      • 93.184.215.14
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 93.184.215.14
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 93.184.215.14
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 93.184.215.14
                                                                                                                                                                                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                      • 93.184.215.14
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 93.184.215.14
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 93.184.215.14
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 93.184.215.14
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 93.184.215.14
                                                                                                                                                                                                      star-mini.c10r.facebook.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 157.240.0.35
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 157.240.253.35
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 157.240.251.35
                                                                                                                                                                                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                      • 157.240.0.35
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 157.240.0.35
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 157.240.251.35
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 157.240.0.35
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 157.240.0.35
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 157.240.251.35
                                                                                                                                                                                                      twitter.comfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 104.244.42.1
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 104.244.42.1
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 104.244.42.129
                                                                                                                                                                                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                      • 104.244.42.129
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 104.244.42.1
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 104.244.42.1
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 104.244.42.193
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 104.244.42.65
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 104.244.42.193
                                                                                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                      GOOGLE-AS-APGoogleAsiaPacificPteLtdSGfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                      • 34.117.188.166
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.117.188.166
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.117.188.166
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.117.188.166
                                                                                                                                                                                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                      • 34.117.188.166
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.117.188.166
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.117.188.166
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.117.188.166
                                                                                                                                                                                                      https://send-space.s3.eu-north-1.amazonaws.com/de.htmlGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                      • 34.117.77.79
                                                                                                                                                                                                      FASTLYUSfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.129.91
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.193.91
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.1.91
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.65.91
                                                                                                                                                                                                      https://pcapp.store/pixel.gifGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                      • 151.101.193.229
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.65.91
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.193.91
                                                                                                                                                                                                      file.exeGet hashmaliciousWhiteSnake StealerBrowse
                                                                                                                                                                                                      • 185.199.110.133
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.1.91
                                                                                                                                                                                                      ATGS-MMD-ASUSfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      https://send-space.s3.eu-north-1.amazonaws.com/de.htmlGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                      • 34.36.216.150
                                                                                                                                                                                                      ATGS-MMD-ASUSfile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      https://send-space.s3.eu-north-1.amazonaws.com/de.htmlGet hashmaliciousUnknownBrowse
                                                                                                                                                                                                      • 34.36.216.150
                                                                                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                      fb0aa01abe9d8e4037eb3473ca6e2dcafile.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                      • 151.101.193.91
                                                                                                                                                                                                      • 35.244.181.201
                                                                                                                                                                                                      • 34.149.100.209
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      • 34.120.208.123
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.193.91
                                                                                                                                                                                                      • 35.244.181.201
                                                                                                                                                                                                      • 34.149.100.209
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      • 34.120.208.123
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.193.91
                                                                                                                                                                                                      • 35.244.181.201
                                                                                                                                                                                                      • 34.149.100.209
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      • 34.120.208.123
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.193.91
                                                                                                                                                                                                      • 35.244.181.201
                                                                                                                                                                                                      • 34.149.100.209
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      • 34.120.208.123
                                                                                                                                                                                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                                                                                                                                                                                      • 151.101.193.91
                                                                                                                                                                                                      • 35.244.181.201
                                                                                                                                                                                                      • 34.149.100.209
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      • 34.120.208.123
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.193.91
                                                                                                                                                                                                      • 35.244.181.201
                                                                                                                                                                                                      • 34.149.100.209
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      • 34.120.208.123
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.193.91
                                                                                                                                                                                                      • 35.244.181.201
                                                                                                                                                                                                      • 34.149.100.209
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      • 34.120.208.123
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.193.91
                                                                                                                                                                                                      • 35.244.181.201
                                                                                                                                                                                                      • 34.149.100.209
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      • 34.120.208.123
                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                      • 151.101.193.91
                                                                                                                                                                                                      • 35.244.181.201
                                                                                                                                                                                                      • 34.149.100.209
                                                                                                                                                                                                      • 34.160.144.191
                                                                                                                                                                                                      • 34.120.208.123
                                                                                                                                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                                                                                                                                      C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll.tmpfile.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                        C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\gmp-gmpopenh264\1.8.1.2\gmpopenh264.dll (copy)file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                          file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                            file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                              file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                  file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                    file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                      file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                        file.exeGet hashmaliciousCredential FlusherBrowse
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:JSON data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):7813
                                                                                                                                                                                                                                          Entropy (8bit):5.178094792759006
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:192:JLjMiIKFcbhbVbTbfbRbObtbyEl7nMrdJA6WnSrDtTUd/SkDrbi:JYocNhnzFSJsrYBnSrDhUd/U
                                                                                                                                                                                                                                          MD5:D36B4B65715011C2F1B1E421A1B60212
                                                                                                                                                                                                                                          SHA1:2C87B2230FE9EE5BAC08CBF675AD2BC16CF97DF1
                                                                                                                                                                                                                                          SHA-256:643D7156F1A6A542C5115F4C6F7C981BB3A69BF585382CF2DA7612DB8A64B151
                                                                                                                                                                                                                                          SHA-512:79E9F1CA7BE5933EE36FE7AACE1C1844652AA3F846D94576C6CF92B8192618CBD799E9CB3CBB95C0F4CBEEB7832EE0941C3D98141895693ED2BBD8AC464E323A
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:{"type":"uninstall","id":"4166cfac-438d-4230-8be7-b58469c23853","creationDate":"2024-11-01T13:27:26.143Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:JSON data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):7813
                                                                                                                                                                                                                                          Entropy (8bit):5.178094792759006
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:192:JLjMiIKFcbhbVbTbfbRbObtbyEl7nMrdJA6WnSrDtTUd/SkDrbi:JYocNhnzFSJsrYBnSrDhUd/U
                                                                                                                                                                                                                                          MD5:D36B4B65715011C2F1B1E421A1B60212
                                                                                                                                                                                                                                          SHA1:2C87B2230FE9EE5BAC08CBF675AD2BC16CF97DF1
                                                                                                                                                                                                                                          SHA-256:643D7156F1A6A542C5115F4C6F7C981BB3A69BF585382CF2DA7612DB8A64B151
                                                                                                                                                                                                                                          SHA-512:79E9F1CA7BE5933EE36FE7AACE1C1844652AA3F846D94576C6CF92B8192618CBD799E9CB3CBB95C0F4CBEEB7832EE0941C3D98141895693ED2BBD8AC464E323A
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:{"type":"uninstall","id":"4166cfac-438d-4230-8be7-b58469c23853","creationDate":"2024-11-01T13:27:26.143Z","version":4,"application":{"architecture":"x86-64","buildId":"20230927232528","name":"Firefox","version":"118.0.1","displayVersion":"118.0.1","vendor":"Mozilla","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","channel":"release"},"payload":{"otherInstalls":0},"clientId":"65e71c9e-6ac3-4903-9066-b134350de32c","environment":{"build":{"applicationId":"{ec8030f7-c20a-464f-9b0e-13a3a9e97384}","applicationName":"Firefox","architecture":"x86-64","buildId":"20230927232528","version":"118.0.1","vendor":"Mozilla","displayVersion":"118.0.1","platformVersion":"118.0.1","xpcomAbi":"x86_64-msvc","updaterAvailable":true},"partner":{"distributionId":null,"distributionVersion":null,"partnerId":null,"distributor":null,"distributorChannel":null,"partnerNames":[]},"system":{"memoryMB":8191,"virtualMaxMB":134217728,"cpu":{"isWindowsSMode":false,"count":4,"cores":2,"vendor":"GenuineIntel","name":"I
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:MS Windows icon resource - 1 icon, 16x16 with PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced, 24 bits/pixel
                                                                                                                                                                                                                                          Category:modified
                                                                                                                                                                                                                                          Size (bytes):490
                                                                                                                                                                                                                                          Entropy (8bit):7.246483341090937
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:12:l8v/7J2T+gwjz+vdzLSMO9mj253UT3BcHXhJo:82CgwS//O91iT3BUXh6
                                                                                                                                                                                                                                          MD5:BD9751DFFFEFFA2154CC5913489ED58C
                                                                                                                                                                                                                                          SHA1:1C9230053C45CA44883103A6ACFDF49AC53ABF45
                                                                                                                                                                                                                                          SHA-256:834C4F18E96CFDAA395246183DE76032F1B77886764CEEBE52F6A146FA4D4C3B
                                                                                                                                                                                                                                          SHA-512:01072F60F4B2489BB84639A6179A82A3EA90A31C1AD61D30EF27800C3114DB5E45662583E1C0B5382F51635DC14372EFC71DCD069999D6B21A5D256C70697790
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:.......................PNG........IHDR................a....IDAT8O...1P......p....d1.....v)......p.nXM.t.H.(.......B$..}_G.{.......:uN...=......s|.$...`0.....dl6.>>>p.\.v;z.......F.a:.2..D.V.....V..n...g.z.X..C...v.......=.H..d..P*...i.."...X,.B...h...xyy.V....I$..J%r....6....Z-:...P..J..........|>'...P.\&.....l6....N5...Z.x<.....h.z..'@...L&.F..'.Jq<...m6.OOO.....$..r:.......v..V..ze.\.p.R..t.Z.....r...B...3.B..0...T*E".p8.D0..`2.D.j...h..n...wF...........#......O....IEND.B`.
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):32768
                                                                                                                                                                                                                                          Entropy (8bit):0.4593089050301797
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:48:9SP0nUgwyZXYI65yFRX2D3GNTTfyn0Mk1iA:9SDKaIjo3UzyE1L
                                                                                                                                                                                                                                          MD5:D910AD167F0217587501FDCDB33CC544
                                                                                                                                                                                                                                          SHA1:2F57441CEFDC781011B53C1C5D29AC54835AFC1D
                                                                                                                                                                                                                                          SHA-256:E3699D9404A3FFC1AFF0CA8A3972DC0EF38BDAB927741E9F627C7C55CEA42E81
                                                                                                                                                                                                                                          SHA-512:F1871BF28FF25EE52BDB99C7A80AB715C7CAC164DCD2FD87E681168EE927FD2C5E80E03C91BB638D955A4627213BF575FF4D9EECAEDA7718C128CF2CE8F7CB3D
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:... ftypisom....isomiso2avc1mp41....free....mdat..........E...H..,. .#..x264 - core 152 r2851 ba24899 - H.264/MPEG-4 AVC codec - Copyleft 2003-2017 - http://www.videolan.org/x264.html - options: cabac=1 ref=3 deblock=1:0:0 analyse=0x3:0x113 me=hex subme=7 psy=1 psy_rd=1.00:0.00 mixed_ref=1 me_range=16 chroma_me=1 trellis=1 8x8dct=1 cqm=0 deadzone=21,11 fast_pskip=1 chroma_qp_offset=-2 threads=4 lookahead_threads=1 sliced_threads=0 nr=0 decimate=1 interlaced=0 bluray_compat=0 constrained_intra=0 bframes=3 b_pyramid=2 b_adapt=1 b_bias=0 direct=1 weightb=1 open_gop=0 weightp=2 keyint=250 keyint_min=25 scenecut=40 intra_refresh=0 rc_lookahead=40 rc=crf mbtree=1 crf=23.0 qcomp=0.60 qpmin=0 qpmax=69 qpstep=4 ip_ratio=1.40 aq=1:1.00......e...+...s|.kG3...'.u.."...,J.w.~.d\..(K....!.+..;....h....(.T.*...M......0..~L..8..B..A.y..R..,.zBP.';j.@.].w..........c......C=.'f....gI.$^.......m5V.L...{U..%V[....8......B..i..^,....:...,..5.m.%dA....moov...lmvhd...................(...........
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:Zip archive data, at least v2.0 to extract, compression method=deflate
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):453023
                                                                                                                                                                                                                                          Entropy (8bit):7.997718157581587
                                                                                                                                                                                                                                          Encrypted:true
                                                                                                                                                                                                                                          SSDEEP:12288:tESTeqTI2r4ZbCgUKWKNeRcPMb6qlV7hVZe3:tEsed2Xh9/bdzZe3
                                                                                                                                                                                                                                          MD5:85430BAED3398695717B0263807CF97C
                                                                                                                                                                                                                                          SHA1:FFFBEE923CEA216F50FCE5D54219A188A5100F41
                                                                                                                                                                                                                                          SHA-256:A9F4281F82B3579581C389E8583DC9F477C7FD0E20C9DFC91A2E611E21E3407E
                                                                                                                                                                                                                                          SHA-512:06511F1F6C6D44D076B3C593528C26A602348D9C41689DBF5FF716B671C3CA5756B12CB2E5869F836DEDCE27B1A5CFE79B93C707FD01F8E84B620923BB61B5F1
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:PK.........bN...R..........gmpopenh264.dll..|.E.0.=..I.....1....4f1q.`.........q.....'+....h*m{.z..o_.{w........$..($A!...|L...B&A2.s.{..Dd......c.U.U..9u.S...K.l`...../.d.-....|.....&....9......wn..x......i.#O.+.Y.l......+....,3.3f..\..c.SSS,............N...GG...F.'.&.:'.K.Z&.>.@.g..M...M.`...*.........ZR....^jg.G.Kb.o~va.....<Z..1.#.O.e.....D..X..i..$imBW..Q&.......P.....,M.,..:.c...-...\......*.....-i.K.I..4.a..6..*...Ov=...W..F.CH.>...a.'.x...#@f...d..u.1....OV.1o}....g.5.._.3.J.Hi.Z.ipM....b.Z....%.G..F................/..3.q..J.....o...%.g.N.*.}..).3.N%.!..q*........^I.m..~...6.#.~+.....A...I]r...x..*.<IYj....p0..`S.M@.E..f.=.;!.@.....E..E....... .0.n....Jd..d......uM.-.qI.lR..z..=}..r.D.XLZ....x.$..|c.1.cUkM.&.Qn]..a]t.h..*.!.6 7..Jd.DvKJ"Wgd*%n...w...Jni.inmr.@M.$'Z.s....#)%..Rs..:.h....R....\..t.6..'.g.........Uj+F.cr:|..!..K.W.Y...17......,....r.....>.N..3.R.Y.._\...Ir.DNJdM... .k...&V-....z.%...-...D..i..&...6....7.2T).>..0..%.&.
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):5488
                                                                                                                                                                                                                                          Entropy (8bit):3.3162215868829508
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:24:jfFdf0AAWTIUx2dWoM15QLN8zmZfKdf0AAWswM+bpoqdWoM15QLFX1RgmZf0df0h:j9divUgdwdzECdiZ6BdwbEMdiZadwJ1
                                                                                                                                                                                                                                          MD5:A99D23C9B519693E31B809CE21274408
                                                                                                                                                                                                                                          SHA1:688CE5E3C7FE4E5EFA36D233120571CF98B84629
                                                                                                                                                                                                                                          SHA-256:FEAA40CA7F9C13BE5547FBE9EFE374D7CC3D734D831B3C72C303B181114FC576
                                                                                                                                                                                                                                          SHA-512:1E1ED476C137D4372890AEA2E82545055D9B2056376B1E5F16DB9B6B5E42549F224E6B1A9BDB26F36253AF35304E353AFC83E4A98D4B989174FF869E8F38533B
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:...................................FL..................F.@.. ...p........)..R,..........S...........................P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.IaY.]....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}WaY.]............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}WaY.]..............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z...........jQ.q.....C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):5488
                                                                                                                                                                                                                                          Entropy (8bit):3.3162215868829508
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:24:jfFdf0AAWTIUx2dWoM15QLN8zmZfKdf0AAWswM+bpoqdWoM15QLFX1RgmZf0df0h:j9divUgdwdzECdiZ6BdwbEMdiZadwJ1
                                                                                                                                                                                                                                          MD5:A99D23C9B519693E31B809CE21274408
                                                                                                                                                                                                                                          SHA1:688CE5E3C7FE4E5EFA36D233120571CF98B84629
                                                                                                                                                                                                                                          SHA-256:FEAA40CA7F9C13BE5547FBE9EFE374D7CC3D734D831B3C72C303B181114FC576
                                                                                                                                                                                                                                          SHA-512:1E1ED476C137D4372890AEA2E82545055D9B2056376B1E5F16DB9B6B5E42549F224E6B1A9BDB26F36253AF35304E353AFC83E4A98D4B989174FF869E8F38533B
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:...................................FL..................F.@.. ...p........)..R,..........S...........................P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.IaY.]....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}WaY.]............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}WaY.]..............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z...........jQ.q.....C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):5488
                                                                                                                                                                                                                                          Entropy (8bit):3.3162215868829508
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:24:jfFdf0AAWTIUx2dWoM15QLN8zmZfKdf0AAWswM+bpoqdWoM15QLFX1RgmZf0df0h:j9divUgdwdzECdiZ6BdwbEMdiZadwJ1
                                                                                                                                                                                                                                          MD5:A99D23C9B519693E31B809CE21274408
                                                                                                                                                                                                                                          SHA1:688CE5E3C7FE4E5EFA36D233120571CF98B84629
                                                                                                                                                                                                                                          SHA-256:FEAA40CA7F9C13BE5547FBE9EFE374D7CC3D734D831B3C72C303B181114FC576
                                                                                                                                                                                                                                          SHA-512:1E1ED476C137D4372890AEA2E82545055D9B2056376B1E5F16DB9B6B5E42549F224E6B1A9BDB26F36253AF35304E353AFC83E4A98D4B989174FF869E8F38533B
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:...................................FL..................F.@.. ...p........)..R,..........S...........................P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.IaY.]....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}WaY.]............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}WaY.]..............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z...........jQ.q.....C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):5488
                                                                                                                                                                                                                                          Entropy (8bit):3.3162215868829508
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:24:jfFdf0AAWTIUx2dWoM15QLN8zmZfKdf0AAWswM+bpoqdWoM15QLFX1RgmZf0df0h:j9divUgdwdzECdiZ6BdwbEMdiZadwJ1
                                                                                                                                                                                                                                          MD5:A99D23C9B519693E31B809CE21274408
                                                                                                                                                                                                                                          SHA1:688CE5E3C7FE4E5EFA36D233120571CF98B84629
                                                                                                                                                                                                                                          SHA-256:FEAA40CA7F9C13BE5547FBE9EFE374D7CC3D734D831B3C72C303B181114FC576
                                                                                                                                                                                                                                          SHA-512:1E1ED476C137D4372890AEA2E82545055D9B2056376B1E5F16DB9B6B5E42549F224E6B1A9BDB26F36253AF35304E353AFC83E4A98D4B989174FF869E8F38533B
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:...................................FL..................F.@.. ...p........)..R,..........S...........................P.O. .:i.....+00.../C:\.....................1.....DW.V..PROGRA~1..t......O.IaY.]....B...............J.....i...P.r.o.g.r.a.m. .F.i.l.e.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.1.....h.1.....CW.X..MOZILL~1..P......CW}WaY.]............................>.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.....b.2..S..<W,. .firefox.exe.H......CW}WaY.]..............................f.i.r.e.f.o.x...e.x.e.......[...............-.......Z...........jQ.q.....C:\Program Files\Mozilla Firefox\firefox.exe....O.p.e.n. .a. .n.e.w. .b.r.o.w.s.e.r. .t.a.b.....-.n.e.w.-.t.a.b. .a.b.o.u.t.:.b.l.a.n.k.,.C.:.\.P.r.o.g.r.a.m. .F.i.l.e.s.\.M.o.z.i.l.l.a. .F.i.r.e.f.o.x.\.f.i.r.e.f.o.x...e.x.e.........%ProgramFiles%\Mozilla Firefox\firefox.exe................................................................................................................................................................................
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:JSON data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):3621
                                                                                                                                                                                                                                          Entropy (8bit):4.92149650193359
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:96:8S+OfJQPUFpOdwNIOdYVjvYcXaNLOyxLp8P:8S+OBIUjOdwiOdYVjjwLOMLp8P
                                                                                                                                                                                                                                          MD5:9B18A805C128715EAF51517B5EAB56A8
                                                                                                                                                                                                                                          SHA1:20A04340B36CA3606D979AEFBC356049E0CF3A95
                                                                                                                                                                                                                                          SHA-256:661C2B491AC555005FF90AE91C3B2473726B645E1C5302432BC20328BFA18DF8
                                                                                                                                                                                                                                          SHA-512:027816FF1CA015CDEB1EA3C9CFCAC7B38788880FFCC47E79EEAD7CF7C6A43C2ECB689EECE5A9E01D2AD529DB9023A42F03AFD2FA8C14244D25CC90527BB48F16
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"c5d95379-f4ee-4629-a507-6f15a0e93cd4","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-03T11:50:29.548Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:JSON data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):3621
                                                                                                                                                                                                                                          Entropy (8bit):4.92149650193359
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:96:8S+OfJQPUFpOdwNIOdYVjvYcXaNLOyxLp8P:8S+OBIUjOdwiOdYVjjwLOMLp8P
                                                                                                                                                                                                                                          MD5:9B18A805C128715EAF51517B5EAB56A8
                                                                                                                                                                                                                                          SHA1:20A04340B36CA3606D979AEFBC356049E0CF3A95
                                                                                                                                                                                                                                          SHA-256:661C2B491AC555005FF90AE91C3B2473726B645E1C5302432BC20328BFA18DF8
                                                                                                                                                                                                                                          SHA-512:027816FF1CA015CDEB1EA3C9CFCAC7B38788880FFCC47E79EEAD7CF7C6A43C2ECB689EECE5A9E01D2AD529DB9023A42F03AFD2FA8C14244D25CC90527BB48F16
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:{"csv-import-release-rollout":{"slug":"csv-import-release-rollout","branch":{"slug":"enable-csv-import","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pre-95-support"},"features":[{"value":{"csvImport":true},"enabled":true,"featureId":"cm-csv-import"}]},"active":true,"enrollmentId":"c5d95379-f4ee-4629-a507-6f15a0e93cd4","experimentType":"rollout","source":"rs-loader","userFacingName":"CSV Import (Release Rollout)","userFacingDescription":"This rollout enables users to import logins from a CSV file from the about:logins page.","lastSeen":"2023-10-03T11:50:29.548Z","featureIds":["cm-csv-import"],"prefs":[{"name":"signon.management.page.fileImport.enabled","branch":"default","featureId":"cm-csv-import","variable":"csvImport","originalValue":false}],"isRollout":true},"serp-ad-telemetry-rollout":{"slug":"serp-ad-telemetry-rollout","branch":{"slug":"control","ratio":1,"feature":{"value":{},"enabled":false,"featureId":"this-is-included-for-desktop-pr
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:Mozilla lz4 compressed data, originally 23432 bytes
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):5312
                                                                                                                                                                                                                                          Entropy (8bit):6.615424734763731
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:96:V2YbKsKNU2xWrp327tGmD4wBON6h6cHaJVJuZMd0JGkkrw2D:VTx2x2t0FDJ4NpwZMd0EJws
                                                                                                                                                                                                                                          MD5:1B9C8056D3619CE5A8C59B0C09873F17
                                                                                                                                                                                                                                          SHA1:1015C630E1937AA63F6AB31743782ECB5D78CCD8
                                                                                                                                                                                                                                          SHA-256:A6AE5DE0733FED050AB570AD9374FF4593D554F695B5AE4E2495871D171D34A3
                                                                                                                                                                                                                                          SHA-512:B1DC9CC675D5476C270A2D5B214D3DF2B3856576ED7EFE92D9A606C2D9D34E781018902AE75CE9C1E25007BB7F8D8F7B52997E6F05B845EF44BAF22F614FE899
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:mozLz40..[....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:Mozilla lz4 compressed data, originally 23432 bytes
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):5312
                                                                                                                                                                                                                                          Entropy (8bit):6.615424734763731
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:96:V2YbKsKNU2xWrp327tGmD4wBON6h6cHaJVJuZMd0JGkkrw2D:VTx2x2t0FDJ4NpwZMd0EJws
                                                                                                                                                                                                                                          MD5:1B9C8056D3619CE5A8C59B0C09873F17
                                                                                                                                                                                                                                          SHA1:1015C630E1937AA63F6AB31743782ECB5D78CCD8
                                                                                                                                                                                                                                          SHA-256:A6AE5DE0733FED050AB570AD9374FF4593D554F695B5AE4E2495871D171D34A3
                                                                                                                                                                                                                                          SHA-512:B1DC9CC675D5476C270A2D5B214D3DF2B3856576ED7EFE92D9A606C2D9D34E781018902AE75CE9C1E25007BB7F8D8F7B52997E6F05B845EF44BAF22F614FE899
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:mozLz40..[....{"app-system-defaults":{"addon....formautofill@mozilla.org&..Gdependencies":[],"enabled":true,"lastModifiedTime":1695865283000,"loader":null,"path":s.....xpi","recommendationStateA...rootURI":"jar:file:///C:/Program%20Files/M.......refox/browser/features/...... !/...unInSafeMode..wsignedD...telemetryKey..7%40R...:1.0.1","version":"..`},"pic..#in.....T.n..w...........S.......(.[......0....0"},"screenshots..T.r.....[.......(.V....-39.......},"webcompat-reporter...Ofals..&.z.....[.......(.]....=1.5.............<.)....p....d......1.z.!18...5.....startupData...pX.astentL..!er...webRequest%..onBefore...[[{"incognitoi.UtabId..!yp...."main_frame"],"url...."*://login.microsoftonline.com/*","..@us/*L.dwindows...},["blocking"]],...Iimag...https://smartT.".f.....etp/facebook.svg",...Aplay*....8`script...P.....-....-testbed.herokuapp\.`shims_..3.jsh.bexampl|.......Pexten{..Q../?..s...S.J/_2..@&_3U..s7.addthis . ic...officialK......-angularjs/current/dist(..t.min.js...track.adB...net/s
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:JSON data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):24
                                                                                                                                                                                                                                          Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                          MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                          SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                          SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                          SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:JSON data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):24
                                                                                                                                                                                                                                          Entropy (8bit):3.91829583405449
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:3:YWGifTJE6iHQ:YWGif9EE
                                                                                                                                                                                                                                          MD5:3088F0272D29FAA42ED452C5E8120B08
                                                                                                                                                                                                                                          SHA1:C72AA542EF60AFA3DF5DFE1F9FCC06C0B135BE23
                                                                                                                                                                                                                                          SHA-256:D587CEC944023447DC91BC5F71E2291711BA5ADD337464837909A26F34BC5A06
                                                                                                                                                                                                                                          SHA-512:B662414EDD6DEF8589304904263584847586ECCA0B0E6296FB3ADB2192D92FB48697C99BD27C4375D192150E3F99102702AF2391117FFF50A9763C74C193D798
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:{"schema":6,"addons":[]}
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:SQLite 3.x database, user version 5, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 8, cookie 0x6, schema 4, largest root page 8, UTF-8, vacuum mode 1, version-valid-for 5
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):262144
                                                                                                                                                                                                                                          Entropy (8bit):0.04905391753567332
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:24:DLivwae+Q8Uu50xj0aWe9LxYkKA25Q5tvAA:D6wae+QtMImelekKDa5
                                                                                                                                                                                                                                          MD5:DD9D28E87ED57D16E65B14501B4E54D1
                                                                                                                                                                                                                                          SHA1:793839B47326441BE2D1336BA9A61C9B948C578D
                                                                                                                                                                                                                                          SHA-256:BB4E6C58C50BD6399ED70468C02B584595C29F010B66F864CD4D6B427FA365BC
                                                                                                                                                                                                                                          SHA-512:A2626F6A3CBADE62E38DA5987729D99830D0C6AA134D4A9E615026A5F18ACBB11A2C3C80917DAD76DA90ED5BAA9B0454D4A3C2DD04436735E78C974BA1D035B1
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:SQLite format 3......@ ..........................................................................j......|....~.}.}z}-|.................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):66
                                                                                                                                                                                                                                          Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                          MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                          SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                          SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                          SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:Mozilla lz4 compressed data, originally 56 bytes
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):66
                                                                                                                                                                                                                                          Entropy (8bit):4.837595020998689
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:3:3fX/xH8IXl/I3v0lb7iioW:vXpH1RPXt
                                                                                                                                                                                                                                          MD5:A6338865EB252D0EF8FCF11FA9AF3F0D
                                                                                                                                                                                                                                          SHA1:CECDD4C4DCAE10C2FFC8EB938121B6231DE48CD3
                                                                                                                                                                                                                                          SHA-256:078648C042B9B08483CE246B7F01371072541A2E90D1BEB0C8009A6118CBD965
                                                                                                                                                                                                                                          SHA-512:D950227AC83F4E8246D73F9F35C19E88CE65D0CA5F1EF8CCBB02ED6EFC66B1B7E683E2BA0200279D7CA4B49831FD8C3CEB0584265B10ACCFF2611EC1CA8C0C6C
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:mozLz40.8.....{"v":1,"crashes":{},"countsByDay....rruptDate":null}
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:JSON data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):36830
                                                                                                                                                                                                                                          Entropy (8bit):5.185924656884556
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:768:wI43DvfWXf4E6C4p4EC4Y4QfEWvM4B4QS4z4444XQ4U:wUfdvk
                                                                                                                                                                                                                                          MD5:5656BA69BD2966108A461AAE35F60226
                                                                                                                                                                                                                                          SHA1:9C2E5AE52D82CEA43C4A5FFF205A7700CF54D61C
                                                                                                                                                                                                                                          SHA-256:587596712960B26EAC18CB354CCD633FFDB218E374A9D59EFEA843914D7AB299
                                                                                                                                                                                                                                          SHA-512:38F715AD9156558B5D57CA2E75FB0FFE0C5C6728BD94484B8F15E090120DDD02DCE42DBC9CC7143AD6552460A5F3A40E577FAF1D76D5D40B25CDBE636F250054
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{60024e8e-cfd0-41e5-965d-7128c7dcf0e8}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:JSON data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):36830
                                                                                                                                                                                                                                          Entropy (8bit):5.185924656884556
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:768:wI43DvfWXf4E6C4p4EC4Y4QfEWvM4B4QS4z4444XQ4U:wUfdvk
                                                                                                                                                                                                                                          MD5:5656BA69BD2966108A461AAE35F60226
                                                                                                                                                                                                                                          SHA1:9C2E5AE52D82CEA43C4A5FFF205A7700CF54D61C
                                                                                                                                                                                                                                          SHA-256:587596712960B26EAC18CB354CCD633FFDB218E374A9D59EFEA843914D7AB299
                                                                                                                                                                                                                                          SHA-512:38F715AD9156558B5D57CA2E75FB0FFE0C5C6728BD94484B8F15E090120DDD02DCE42DBC9CC7143AD6552460A5F3A40E577FAF1D76D5D40B25CDBE636F250054
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:{"schemaVersion":35,"addons":[{"id":"formautofill@mozilla.org","syncGUID":"{60024e8e-cfd0-41e5-965d-7128c7dcf0e8}","version":"1.0.1","type":"extension","loader":null,"updateURL":null,"installOrigins":null,"manifestVersion":2,"optionsURL":null,"optionsType":null,"optionsBrowserStyle":true,"aboutURL":null,"defaultLocale":{"name":"Form Autofill","creator":null,"developers":null,"translators":null,"contributors":null},"visible":true,"active":true,"userDisabled":false,"appDisabled":false,"embedderDisabled":false,"installDate":1695865283000,"updateDate":1695865283000,"applyBackgroundUpdates":1,"path":"C:\\Program Files\\Mozilla Firefox\\browser\\features\\formautofill@mozilla.org.xpi","skinnable":false,"sourceURI":null,"releaseNotesURI":null,"softDisabled":false,"foreignInstall":false,"strictCompatibility":true,"locales":[],"targetApplications":[{"id":"toolkit@mozilla.org","minVersion":null,"maxVersion":null}],"targetPlatforms":[],"signedDate":null,"seen":true,"dependencies":[],"incognito":"
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):32768
                                                                                                                                                                                                                                          Entropy (8bit):0.017262956703125623
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:3:G8lQs2TSlElQs2TtPRp//:G0QjSaQjrpX
                                                                                                                                                                                                                                          MD5:B7C14EC6110FA820CA6B65F5AEC85911
                                                                                                                                                                                                                                          SHA1:608EEB7488042453C9CA40F7E1398FC1A270F3F4
                                                                                                                                                                                                                                          SHA-256:FD4C9FDA9CD3F9AE7C962B0DDF37232294D55580E1AA165AA06129B8549389EB
                                                                                                                                                                                                                                          SHA-512:D8D75760F29B1E27AC9430BC4F4FFCEC39F1590BE5AEF2BFB5A535850302E067C288EF59CF3B2C5751009A22A6957733F9F80FA18F2B0D33D90C068A3F08F3B0
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:..-.....................................8...5.....-.....................................8...5...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):1021904
                                                                                                                                                                                                                                          Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                          MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                          SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                          SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                          SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                          Joe Sandbox View:
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:PE32+ executable (DLL) (GUI) x86-64, for MS Windows
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):1021904
                                                                                                                                                                                                                                          Entropy (8bit):6.648417932394748
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:12288:vYLdTfFKbNSjv92eFN+3wH+NYriA0Iq6lh6VawYIpAvwHN/Uf1h47HAfg1oet:vYLdTZ923NYrjwNpgwef1hzfg1x
                                                                                                                                                                                                                                          MD5:FE3355639648C417E8307C6D051E3E37
                                                                                                                                                                                                                                          SHA1:F54602D4B4778DA21BC97C7238FC66AA68C8EE34
                                                                                                                                                                                                                                          SHA-256:1ED7877024BE63A049DA98733FD282C16BD620530A4FB580DACEC3A78ACE914E
                                                                                                                                                                                                                                          SHA-512:8F4030BB2464B98ECCBEA6F06EB186D7216932702D94F6B84C56419E9CF65A18309711AB342D1513BF85AED402BC3535A70DB4395874828F0D35C278DD2EAC9C
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Antivirus:
                                                                                                                                                                                                                                          • Antivirus: ReversingLabs, Detection: 0%
                                                                                                                                                                                                                                          Joe Sandbox View:
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                                                                                                                                                                                          Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......NH...)...)...)..eM...)..eM...)..eM..)..eM...)...)..i)..XA...)..XA..;)..XA...)...)..g)..cA...)..cA...)..Rich.)..........PE..d....z\.........." .....t................................................................`.........................................P...,...|...(............P...H...z.................T...........................0...................p............................text...$s.......t.................. ..`.rdata...~...........x..............@..@.data....3..........................@....pdata...H...P...J..................@..@.rodata..............^..............@..@.reloc...............j..............@..B........................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:ASCII text
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):116
                                                                                                                                                                                                                                          Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                          MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                          SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                          SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                          SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:ASCII text
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):116
                                                                                                                                                                                                                                          Entropy (8bit):4.968220104601006
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:3:C3OuN9RAM7VDXcEzq+rEakOvTMBv+FdBAIABv+FEn:0BDUmHlvAWeWEn
                                                                                                                                                                                                                                          MD5:3D33CDC0B3D281E67DD52E14435DD04F
                                                                                                                                                                                                                                          SHA1:4DB88689282FD4F9E9E6AB95FCBB23DF6E6485DB
                                                                                                                                                                                                                                          SHA-256:F526E9F98841D987606EFEAFF7F3E017BA9FD516C4BE83890C7F9A093EA4C47B
                                                                                                                                                                                                                                          SHA-512:A4A96743332CC8EF0F86BC2E6122618BFC75ED46781DADBAC9E580CD73DF89E74738638A2CCCB4CAA4CBBF393D771D7F2C73F825737CDB247362450A0D4A4BC1
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:Name: gmpopenh264.Description: GMP Plugin for OpenH264..Version: 1.8.1.APIs: encode-video[h264], decode-video[h264].
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, file counter 4, database pages 3, cookie 0x2, schema 4, UTF-8, version-valid-for 4
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):98304
                                                                                                                                                                                                                                          Entropy (8bit):0.07324205060056374
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:12:DBl/A0OWla0mwPxRymgObsCVR45wcYR4fmnsCVR4zki:DLhesh7Owd4+ji
                                                                                                                                                                                                                                          MD5:637FDD048D38BDE7A34C33623579F945
                                                                                                                                                                                                                                          SHA1:BA4F8B165250C9E355FE5B8182EDF5B946DA6218
                                                                                                                                                                                                                                          SHA-256:CCCFF210441F3756DA4D471567E22CBD705A01943AC5065F2A63907149B9358C
                                                                                                                                                                                                                                          SHA-512:3B9D6461D63BE5BC1A8F4BBBAF29F60F01776FADFCE347828089E5823C6A13CF6EE853873D9EEE8D380165BC249DD32CCFCBC38C9E8FCC57DE1FD135A00322A1
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:SQLite format 3......@ ..........................................................................j......~s..F~s........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):32768
                                                                                                                                                                                                                                          Entropy (8bit):0.03948115564331722
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:3:GHlhV1q+TIUjlMIlPlhV1q+TIUjlmltol8a9//Ylll4llqlyllel4lt:G7VEKj2YDVEKjMlOL9XIwlio
                                                                                                                                                                                                                                          MD5:A836C01D5DEBD02BD33E9338F6A4D409
                                                                                                                                                                                                                                          SHA1:07B6EE1EADEC25B216AB837EDEB392EB8FC7B190
                                                                                                                                                                                                                                          SHA-256:ECED9A17D428063A626C886C98B6D9AC2A13F18721628330A5F4ACF9B69876F1
                                                                                                                                                                                                                                          SHA-512:BF6E935C372C8DE1A0C1CD78DDD99DB4F50CC872C21FB93F99F0F99A7581E0525DB2C8EC7B02B06043C543B4D82C4C8531DC0D5F772E967A817F5B61BC0E0576
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:..-........................G...@P....f=.m1........-........................G...@P....f=.m1..............................................................'...............................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:SQLite Write-Ahead Log, version 3007000
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):163992
                                                                                                                                                                                                                                          Entropy (8bit):0.11783584415253047
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:24:KwkfkGDLxsZ++jxsMltTAUCF2QWUCZ7CCQE/TKCbCMxsaxXwlW0VZ2i7+:CMsQtJtUnWdU+RVxAsSZk
                                                                                                                                                                                                                                          MD5:A2DDD7FECBD7C7B1F5EF7A7BC44BDD1C
                                                                                                                                                                                                                                          SHA1:EC8995E50FA4015ADDE9FC1698FE3A08F6F6934D
                                                                                                                                                                                                                                          SHA-256:8D4D4FE0184C55C7258FF00E5BE6D0D1EFA2E50FD5AF9FAE1C9DBF00EEF57110
                                                                                                                                                                                                                                          SHA-512:ACF80CD349170E41CF60E2FD4D73B4CC3A26C4F377E73C3357763B3DDF7E6A14090869415220B05B826453188D0C01766C14C686B4C01BC42017C1D04877D835
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:7....-..........P....f=....c.#..........P....f=.....r>..................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):13254
                                                                                                                                                                                                                                          Entropy (8bit):5.493963063832006
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:192:+naRtLYbBp6ahj4qyaaXG6K7hNO8jc5RfGNBw8d3Sl:7e4qyQrecwg0
                                                                                                                                                                                                                                          MD5:5C2F9614ACC515090CEA75D6A4A80154
                                                                                                                                                                                                                                          SHA1:AE02BBE5C4C15B01309F333EC1A31F9FF819AF01
                                                                                                                                                                                                                                          SHA-256:CF0C682D80547E36F7F181930C0717C8246FECDC078D1F453C0290C01B64656E
                                                                                                                                                                                                                                          SHA-512:EA4DE7F20EC317A6EC2DC6689F42DF402C1AA9BABAB53337D5A60F19DF56261C35620172300CBF41AE3EDB4FC318368FA1F54A76C64EB7E8C00FC5B1B055E258
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1730467616);..user_pref("app.update.lastUpdateTime.background-update-timer", 1730467616);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1730467616);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173046
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:ASCII text, with very long lines (1809), with CRLF line terminators
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):13254
                                                                                                                                                                                                                                          Entropy (8bit):5.493963063832006
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:192:+naRtLYbBp6ahj4qyaaXG6K7hNO8jc5RfGNBw8d3Sl:7e4qyQrecwg0
                                                                                                                                                                                                                                          MD5:5C2F9614ACC515090CEA75D6A4A80154
                                                                                                                                                                                                                                          SHA1:AE02BBE5C4C15B01309F333EC1A31F9FF819AF01
                                                                                                                                                                                                                                          SHA-256:CF0C682D80547E36F7F181930C0717C8246FECDC078D1F453C0290C01B64656E
                                                                                                                                                                                                                                          SHA-512:EA4DE7F20EC317A6EC2DC6689F42DF402C1AA9BABAB53337D5A60F19DF56261C35620172300CBF41AE3EDB4FC318368FA1F54A76C64EB7E8C00FC5B1B055E258
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:// Mozilla User Preferences....// DO NOT EDIT THIS FILE...//..// If you make changes to this file while the application is running,..// the changes will be overwritten when the application exits...//..// To change a preference value, you can either:..// - modify it via the UI (e.g. via about:config in the browser); or..// - set it within a user.js file in your profile.....user_pref("app.normandy.first_run", false);..user_pref("app.normandy.migrationsApplied", 12);..user_pref("app.normandy.user_id", "57f16a19-e119-4073-bf01-28f88011f783");..user_pref("app.update.auto.migrated", true);..user_pref("app.update.background.rolledout", true);..user_pref("app.update.backgroundErrors", 2);..user_pref("app.update.lastUpdateTime.addon-background-update-timer", 1730467616);..user_pref("app.update.lastUpdateTime.background-update-timer", 1730467616);..user_pref("app.update.lastUpdateTime.browser-cleanup-thumbnails", 1730467616);..user_pref("app.update.lastUpdateTime.recipe-client-addon-run", 173046
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:SQLite 3.x database, user version 1, last written using SQLite version 3042000, page size 32768, file counter 5, database pages 2, cookie 0x1, schema 4, UTF-8, version-valid-for 5
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):65536
                                                                                                                                                                                                                                          Entropy (8bit):0.04062825861060003
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:6:ltBl/l4/WN1h4BEJYqWvLue3FMOrMZ0l:DBl/WuntfJiFxMZO
                                                                                                                                                                                                                                          MD5:18F65713B07CB441E6A98655B726D098
                                                                                                                                                                                                                                          SHA1:2CEFA32BC26B25BE81C411B60C9925CB0F1F8F88
                                                                                                                                                                                                                                          SHA-256:B6C268E48546B113551A5AF9CA86BB6A462A512DE6C9289315E125CEB0FD8621
                                                                                                                                                                                                                                          SHA-512:A6871076C7D7ED53B630F9F144ED04303AD54A2E60B94ECA2AA96964D1AB375EEFDCA86CE0D3EB0E9DBB81470C6BD159877125A080C95EB17E54A52427F805FB
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:SQLite format 3......@ ..........................................................................j.......x..x..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:JSON data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):90
                                                                                                                                                                                                                                          Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                          MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                          SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                          SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                          SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:JSON data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):90
                                                                                                                                                                                                                                          Entropy (8bit):4.194538242412464
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:3:YVXKQJAyiVLQwJtJDBA+AJ2LKZXJ3YFwHY:Y9KQOy6Lb1BA+m2L69Yr
                                                                                                                                                                                                                                          MD5:C4AB2EE59CA41B6D6A6EA911F35BDC00
                                                                                                                                                                                                                                          SHA1:5942CD6505FC8A9DABA403B082067E1CDEFDFBC4
                                                                                                                                                                                                                                          SHA-256:00AD9799527C3FD21F3A85012565EAE817490F3E0D417413BF9567BB5909F6A2
                                                                                                                                                                                                                                          SHA-512:71EA16900479E6AF161E0AAD08C8D1E9DED5868A8D848E7647272F3002E2F2013E16382B677ABE3C6F17792A26293B9E27EC78E16F00BD24BA3D21072BD1CAE2
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:{"profile-after-change":true,"final-ui-startup":true,"sessionstore-windows-restored":true}
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):1576
                                                                                                                                                                                                                                          Entropy (8bit):6.331721841663865
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:24:v+USUGlcAxScbLXnIgvK/pnxQwRlszT5sKt0l3eHVQj6TQamhujJlOsIomNVr0ay:GUpOxJbynR623eHTQ4JlIquR4
                                                                                                                                                                                                                                          MD5:2A66B01973789C4EF5B70305E2842CEE
                                                                                                                                                                                                                                          SHA1:F8FE650293F50C10B9CFD8C3D0AC2DFD450CE3FD
                                                                                                                                                                                                                                          SHA-256:E70DD513F5F9DFBE8E3DED933C9860CD9558B53066752FFE6E876DE4C5250CC0
                                                                                                                                                                                                                                          SHA-512:8849A0B392BBF1DBDB01E2C8B1296881234427BE19788955BFA3A3A620E3315582529619F7152D31B7E933AE66B8553E9FD12E72D9C9A58ED5CF7BB428B148BC
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{ff19e36a-4dd8-4437-8716-c74952fae740}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730467620922,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..jUpdate...3,"startTim..`585846...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..eexpiry....592782,"originA
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):1576
                                                                                                                                                                                                                                          Entropy (8bit):6.331721841663865
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:24:v+USUGlcAxScbLXnIgvK/pnxQwRlszT5sKt0l3eHVQj6TQamhujJlOsIomNVr0ay:GUpOxJbynR623eHTQ4JlIquR4
                                                                                                                                                                                                                                          MD5:2A66B01973789C4EF5B70305E2842CEE
                                                                                                                                                                                                                                          SHA1:F8FE650293F50C10B9CFD8C3D0AC2DFD450CE3FD
                                                                                                                                                                                                                                          SHA-256:E70DD513F5F9DFBE8E3DED933C9860CD9558B53066752FFE6E876DE4C5250CC0
                                                                                                                                                                                                                                          SHA-512:8849A0B392BBF1DBDB01E2C8B1296881234427BE19788955BFA3A3A620E3315582529619F7152D31B7E933AE66B8553E9FD12E72D9C9A58ED5CF7BB428B148BC
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{ff19e36a-4dd8-4437-8716-c74952fae740}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730467620922,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..jUpdate...3,"startTim..`585846...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..eexpiry....592782,"originA
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:Mozilla lz4 compressed data, originally 5861 bytes
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):1576
                                                                                                                                                                                                                                          Entropy (8bit):6.331721841663865
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:24:v+USUGlcAxScbLXnIgvK/pnxQwRlszT5sKt0l3eHVQj6TQamhujJlOsIomNVr0ay:GUpOxJbynR623eHTQ4JlIquR4
                                                                                                                                                                                                                                          MD5:2A66B01973789C4EF5B70305E2842CEE
                                                                                                                                                                                                                                          SHA1:F8FE650293F50C10B9CFD8C3D0AC2DFD450CE3FD
                                                                                                                                                                                                                                          SHA-256:E70DD513F5F9DFBE8E3DED933C9860CD9558B53066752FFE6E876DE4C5250CC0
                                                                                                                                                                                                                                          SHA-512:8849A0B392BBF1DBDB01E2C8B1296881234427BE19788955BFA3A3A620E3315582529619F7152D31B7E933AE66B8553E9FD12E72D9C9A58ED5CF7BB428B148BC
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:mozLz40.......{"version":["ses....restore",1],"windows":[{"tab..bentrie....url":"https://youtube.com/account?=.....rs.googl%...v3/signin/challenge/pwd","title[.C..cacheKey":0,"ID":6,"docshellUU...D"{ff19e36a-4dd8-4437-8716-c74952fae740}","resultPrincipalURI":null,"hasUserInteracte...true,"triggering8.p_base64z..\"3\":{}^...docIdentifier":7,"persistK..+}],"lastAccessed":1730467620922,"hidden":false,"searchMode...userContextId...attribut...{},"index":1...questedI..p0,"imag....chrome://global/skin/icons/warning.svg"..aselect...,"_closedTZ.@],"_...C..`GroupCF..":-1,"busy...t...Flags":2167541758....dth":1164,"height":891,"screenX":4...Y..Aizem..."maximize......BeforeMin...&..workspace9...1a5ccf63-1000-409f-b5c1-afec7f75d4d9","zD..1...Wm..l........j..:....1":{..jUpdate...3,"startTim..`585846...centCrash..B0},".....Dcook.. hoc..."addons.mozilla.org","valu...A8bad2467092e6ddeb0dfa9e5ea54d86d26790ca7ba2ce88d10cb4604fe726755","path":"/","na..a"taarI|.Recure...,`.Donly..eexpiry....592782,"originA
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:SQLite 3.x database, user version 131075, last written using SQLite version 3042000, page size 512, file counter 6, database pages 8, cookie 0x4, schema 4, UTF-8, version-valid-for 6
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):4096
                                                                                                                                                                                                                                          Entropy (8bit):2.0836444556178684
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:24:JBwdh/cEUcR9PzNFPFHx/GJRBdkOrDcRB1trwDeAq2gRMyxr3:jnEUo9LXtR+JdkOnohYsl
                                                                                                                                                                                                                                          MD5:8B40B1534FF0F4B533AF767EB5639A05
                                                                                                                                                                                                                                          SHA1:63EDB539EA39AD09D701A36B535C4C087AE08CC9
                                                                                                                                                                                                                                          SHA-256:AF275A19A5C2C682139266065D90C237282274D11C5619A121B7BDBDB252861B
                                                                                                                                                                                                                                          SHA-512:54AF707698CED33C206B1B193DA414D630901762E88E37E99885A50D4D5F8DDC28367C9B401DFE251CF0552B4FA446EE28F78A97C9096AFB0F2898BFBB673B53
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:SQLite format 3......@ ..........................................................................j.....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:JSON data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):4537
                                                                                                                                                                                                                                          Entropy (8bit):5.033251436483983
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:48:YrSAYKn6UQZpExB1+anOsW4Vh351VxWRzzc8eYMsku7f86SLAVL7if5FtsfAcbyk:ycKnyTEr5QFRzzcMvbw6KkCrrc2Rn27
                                                                                                                                                                                                                                          MD5:6F40905129D24474DB3B8C7D0851E49D
                                                                                                                                                                                                                                          SHA1:7A2A779DA8A7DC00A2C69835A66AC8934EBC8B74
                                                                                                                                                                                                                                          SHA-256:95259FD3CB9A4BF2ED9192A68556520D12ED91476A98D63573ABD74591AB08A5
                                                                                                                                                                                                                                          SHA-512:19290C3469C2D0C4A52960010943809951B39BB21BBA772FB60BBBC6AA98E6E738C8A12E1ED43D6ABE16631A8A65D1AAD75B264061770566C1558442D1DEBAEC
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-11-01T13:26:42.402Z","profileAgeCreated":1696333826043,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                          Process:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          File Type:JSON data
                                                                                                                                                                                                                                          Category:dropped
                                                                                                                                                                                                                                          Size (bytes):4537
                                                                                                                                                                                                                                          Entropy (8bit):5.033251436483983
                                                                                                                                                                                                                                          Encrypted:false
                                                                                                                                                                                                                                          SSDEEP:48:YrSAYKn6UQZpExB1+anOsW4Vh351VxWRzzc8eYMsku7f86SLAVL7if5FtsfAcbyk:ycKnyTEr5QFRzzcMvbw6KkCrrc2Rn27
                                                                                                                                                                                                                                          MD5:6F40905129D24474DB3B8C7D0851E49D
                                                                                                                                                                                                                                          SHA1:7A2A779DA8A7DC00A2C69835A66AC8934EBC8B74
                                                                                                                                                                                                                                          SHA-256:95259FD3CB9A4BF2ED9192A68556520D12ED91476A98D63573ABD74591AB08A5
                                                                                                                                                                                                                                          SHA-512:19290C3469C2D0C4A52960010943809951B39BB21BBA772FB60BBBC6AA98E6E738C8A12E1ED43D6ABE16631A8A65D1AAD75B264061770566C1558442D1DEBAEC
                                                                                                                                                                                                                                          Malicious:false
                                                                                                                                                                                                                                          Preview:{"environment":{"locale":"en-US","localeLanguageCode":"en","browserSettings":{"update":{"channel":"release","enabled":true,"autoDownload":true,"background":true}},"attributionData":{"campaign":"%2528not%2Bset%2529","content":"%2528not%2Bset%2529","dlsource":"mozorg","dltoken":"cd09ae95-e2cf-4b8b-8929-791b0dd48cdd","experiment":"%2528not%2Bset%2529","medium":"referral","source":"www.google.com","ua":"chrome","variation":"%2528not%2Bset%2529"},"currentDate":"2024-11-01T13:26:42.402Z","profileAgeCreated":1696333826043,"usesFirefoxSync":false,"isFxAEnabled":true,"isFxASignedIn":false,"sync":{"desktopDevices":0,"mobileDevices":0,"totalDevices":0},"xpinstallEnabled":true,"addonsInfo":{"addons":{"formautofill@mozilla.org":{"version":"1.0.1","type":"extension","isSystem":true,"isWebExtension":true,"name":"Form Autofill","userDisabled":false,"installDate":"2023-09-28T01:41:23.000Z"},"pictureinpicture@mozilla.org":{"version":"1.0.0","type":"extension","isSystem":true,"isWebExtension":true,"name"
                                                                                                                                                                                                                                          File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                                                                                                                                                                          Entropy (8bit):6.58468178842256
                                                                                                                                                                                                                                          TrID:
                                                                                                                                                                                                                                          • Win32 Executable (generic) a (10002005/4) 99.96%
                                                                                                                                                                                                                                          • Generic Win/DOS Executable (2004/3) 0.02%
                                                                                                                                                                                                                                          • DOS Executable Generic (2002/1) 0.02%
                                                                                                                                                                                                                                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                                                                                                                                                                                          File name:file.exe
                                                                                                                                                                                                                                          File size:919'552 bytes
                                                                                                                                                                                                                                          MD5:ceac3c3fb770fceb89de4981f995c333
                                                                                                                                                                                                                                          SHA1:67529ec389c9ab3769ab79aad33c1840e4371180
                                                                                                                                                                                                                                          SHA256:7f471e1fe8730d1c9013199f1945a0f73596d903362d26ad3507c668593ef677
                                                                                                                                                                                                                                          SHA512:3eb765c9e7fb7ef6f748d6311f0b87a4f3c32fe613b6b29c7865eac12619fb7e3e3c85cfff0038662231af2fc05e98da40c94385dc66b27912d29e5b8237c41f
                                                                                                                                                                                                                                          SSDEEP:12288:kqDEvFo+yo4DdbbMWu/jrQu4M9lBAlKhQcDGB3cuBNGE6iOrpfe4JdaDga/Td:kqDEvCTbMWu7rQYlBQcBiT6rprG8abd
                                                                                                                                                                                                                                          TLSH:01159E0273D1C062FFAB92334B5AF6515BBC69260123E61F13981DB9BE701B1563E7A3
                                                                                                                                                                                                                                          File Content Preview:MZ......................@................................... ...........!..L.!This program cannot be run in DOS mode....$.......................j:......j:..C...j:......@.*...............................n.......~.............{.......{.......{.........z....
                                                                                                                                                                                                                                          Icon Hash:aaf3e3e3938382a0
                                                                                                                                                                                                                                          Entrypoint:0x420577
                                                                                                                                                                                                                                          Entrypoint Section:.text
                                                                                                                                                                                                                                          Digitally signed:false
                                                                                                                                                                                                                                          Imagebase:0x400000
                                                                                                                                                                                                                                          Subsystem:windows gui
                                                                                                                                                                                                                                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                                                                                                                                                                                                                                          DLL Characteristics:DYNAMIC_BASE, TERMINAL_SERVER_AWARE
                                                                                                                                                                                                                                          Time Stamp:0x6724BBD2 [Fri Nov 1 11:30:26 2024 UTC]
                                                                                                                                                                                                                                          TLS Callbacks:
                                                                                                                                                                                                                                          CLR (.Net) Version:
                                                                                                                                                                                                                                          OS Version Major:5
                                                                                                                                                                                                                                          OS Version Minor:1
                                                                                                                                                                                                                                          File Version Major:5
                                                                                                                                                                                                                                          File Version Minor:1
                                                                                                                                                                                                                                          Subsystem Version Major:5
                                                                                                                                                                                                                                          Subsystem Version Minor:1
                                                                                                                                                                                                                                          Import Hash:948cc502fe9226992dce9417f952fce3
                                                                                                                                                                                                                                          Instruction
                                                                                                                                                                                                                                          call 00007F2D786F5093h
                                                                                                                                                                                                                                          jmp 00007F2D786F499Fh
                                                                                                                                                                                                                                          push ebp
                                                                                                                                                                                                                                          mov ebp, esp
                                                                                                                                                                                                                                          push esi
                                                                                                                                                                                                                                          push dword ptr [ebp+08h]
                                                                                                                                                                                                                                          mov esi, ecx
                                                                                                                                                                                                                                          call 00007F2D786F4B7Dh
                                                                                                                                                                                                                                          mov dword ptr [esi], 0049FDF0h
                                                                                                                                                                                                                                          mov eax, esi
                                                                                                                                                                                                                                          pop esi
                                                                                                                                                                                                                                          pop ebp
                                                                                                                                                                                                                                          retn 0004h
                                                                                                                                                                                                                                          and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                          mov eax, ecx
                                                                                                                                                                                                                                          and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                          mov dword ptr [ecx+04h], 0049FDF8h
                                                                                                                                                                                                                                          mov dword ptr [ecx], 0049FDF0h
                                                                                                                                                                                                                                          ret
                                                                                                                                                                                                                                          push ebp
                                                                                                                                                                                                                                          mov ebp, esp
                                                                                                                                                                                                                                          push esi
                                                                                                                                                                                                                                          push dword ptr [ebp+08h]
                                                                                                                                                                                                                                          mov esi, ecx
                                                                                                                                                                                                                                          call 00007F2D786F4B4Ah
                                                                                                                                                                                                                                          mov dword ptr [esi], 0049FE0Ch
                                                                                                                                                                                                                                          mov eax, esi
                                                                                                                                                                                                                                          pop esi
                                                                                                                                                                                                                                          pop ebp
                                                                                                                                                                                                                                          retn 0004h
                                                                                                                                                                                                                                          and dword ptr [ecx+04h], 00000000h
                                                                                                                                                                                                                                          mov eax, ecx
                                                                                                                                                                                                                                          and dword ptr [ecx+08h], 00000000h
                                                                                                                                                                                                                                          mov dword ptr [ecx+04h], 0049FE14h
                                                                                                                                                                                                                                          mov dword ptr [ecx], 0049FE0Ch
                                                                                                                                                                                                                                          ret
                                                                                                                                                                                                                                          push ebp
                                                                                                                                                                                                                                          mov ebp, esp
                                                                                                                                                                                                                                          push esi
                                                                                                                                                                                                                                          mov esi, ecx
                                                                                                                                                                                                                                          lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                          mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                          and dword ptr [eax], 00000000h
                                                                                                                                                                                                                                          and dword ptr [eax+04h], 00000000h
                                                                                                                                                                                                                                          push eax
                                                                                                                                                                                                                                          mov eax, dword ptr [ebp+08h]
                                                                                                                                                                                                                                          add eax, 04h
                                                                                                                                                                                                                                          push eax
                                                                                                                                                                                                                                          call 00007F2D786F773Dh
                                                                                                                                                                                                                                          pop ecx
                                                                                                                                                                                                                                          pop ecx
                                                                                                                                                                                                                                          mov eax, esi
                                                                                                                                                                                                                                          pop esi
                                                                                                                                                                                                                                          pop ebp
                                                                                                                                                                                                                                          retn 0004h
                                                                                                                                                                                                                                          lea eax, dword ptr [ecx+04h]
                                                                                                                                                                                                                                          mov dword ptr [ecx], 0049FDD0h
                                                                                                                                                                                                                                          push eax
                                                                                                                                                                                                                                          call 00007F2D786F7788h
                                                                                                                                                                                                                                          pop ecx
                                                                                                                                                                                                                                          ret
                                                                                                                                                                                                                                          push ebp
                                                                                                                                                                                                                                          mov ebp, esp
                                                                                                                                                                                                                                          push esi
                                                                                                                                                                                                                                          mov esi, ecx
                                                                                                                                                                                                                                          lea eax, dword ptr [esi+04h]
                                                                                                                                                                                                                                          mov dword ptr [esi], 0049FDD0h
                                                                                                                                                                                                                                          push eax
                                                                                                                                                                                                                                          call 00007F2D786F7771h
                                                                                                                                                                                                                                          test byte ptr [ebp+08h], 00000001h
                                                                                                                                                                                                                                          pop ecx
                                                                                                                                                                                                                                          Programming Language:
                                                                                                                                                                                                                                          • [ C ] VS2008 SP1 build 30729
                                                                                                                                                                                                                                          • [IMP] VS2008 SP1 build 30729
                                                                                                                                                                                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0xc8e640x17c.rdata
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xd40000x9c28.rsrc
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xde0000x7594.reloc
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0xb0ff00x1c.rdata
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_TLS0xc34000x18.rdata
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0xb10100x40.rdata
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x9c0000x894.rdata
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                                                                                                                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                                                                                                                                                                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                                                                                                                                                                          .text0x10000x9ab1d0x9ac000a1473f3064dcbc32ef93c5c8a90f3a6False0.565500681542811data6.668273581389308IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                          .rdata0x9c0000x2fb820x2fc00c9cf2468b60bf4f80f136ed54b3989fbFalse0.35289185209424084data5.691811547483722IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                          .data0xcc0000x706c0x480053b9025d545d65e23295e30afdbd16d9False0.04356553819444445DOS executable (block device driver @\273\)0.5846666986982398IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                                                                                                                                                                          .rsrc0xd40000x9c280x9e0048aea7ae47f85e9e3a72ef143ca9cf4bFalse0.31568928006329117data5.373877573199955IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                          .reloc0xde0000x75940x7600c68ee8931a32d45eb82dc450ee40efc3False0.7628111758474576data6.7972128181359786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                                                                                                                                                                          NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                                                                                                                                                                          RT_ICON0xd45a80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.7466216216216216
                                                                                                                                                                                                                                          RT_ICON0xd46d00x128Device independent bitmap graphic, 16 x 32 x 4, image size 128, 16 important colorsEnglishGreat Britain0.3277027027027027
                                                                                                                                                                                                                                          RT_ICON0xd47f80x128Device independent bitmap graphic, 16 x 32 x 4, image size 192EnglishGreat Britain0.3885135135135135
                                                                                                                                                                                                                                          RT_ICON0xd49200x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 0EnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                          RT_ICON0xd4c080x128Device independent bitmap graphic, 16 x 32 x 4, image size 0EnglishGreat Britain0.5
                                                                                                                                                                                                                                          RT_ICON0xd4d300xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0EnglishGreat Britain0.2835820895522388
                                                                                                                                                                                                                                          RT_ICON0xd5bd80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0EnglishGreat Britain0.37906137184115524
                                                                                                                                                                                                                                          RT_ICON0xd64800x568Device independent bitmap graphic, 16 x 32 x 8, image size 0EnglishGreat Britain0.23699421965317918
                                                                                                                                                                                                                                          RT_ICON0xd69e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0EnglishGreat Britain0.13858921161825727
                                                                                                                                                                                                                                          RT_ICON0xd8f900x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0EnglishGreat Britain0.25070356472795496
                                                                                                                                                                                                                                          RT_ICON0xda0380x468Device independent bitmap graphic, 16 x 32 x 32, image size 0EnglishGreat Britain0.3173758865248227
                                                                                                                                                                                                                                          RT_MENU0xda4a00x50dataEnglishGreat Britain0.9
                                                                                                                                                                                                                                          RT_STRING0xda4f00x594dataEnglishGreat Britain0.3333333333333333
                                                                                                                                                                                                                                          RT_STRING0xdaa840x68adataEnglishGreat Britain0.2735961768219833
                                                                                                                                                                                                                                          RT_STRING0xdb1100x490dataEnglishGreat Britain0.3715753424657534
                                                                                                                                                                                                                                          RT_STRING0xdb5a00x5fcdataEnglishGreat Britain0.3087467362924282
                                                                                                                                                                                                                                          RT_STRING0xdbb9c0x65cdataEnglishGreat Britain0.34336609336609336
                                                                                                                                                                                                                                          RT_STRING0xdc1f80x466dataEnglishGreat Britain0.3605683836589698
                                                                                                                                                                                                                                          RT_STRING0xdc6600x158Matlab v4 mat-file (little endian) n, numeric, rows 0, columns 0EnglishGreat Britain0.502906976744186
                                                                                                                                                                                                                                          RT_RCDATA0xdc7b80xef0data1.0028765690376569
                                                                                                                                                                                                                                          RT_GROUP_ICON0xdd6a80x76dataEnglishGreat Britain0.6610169491525424
                                                                                                                                                                                                                                          RT_GROUP_ICON0xdd7200x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                          RT_GROUP_ICON0xdd7340x14dataEnglishGreat Britain1.15
                                                                                                                                                                                                                                          RT_GROUP_ICON0xdd7480x14dataEnglishGreat Britain1.25
                                                                                                                                                                                                                                          RT_VERSION0xdd75c0xdcdataEnglishGreat Britain0.6181818181818182
                                                                                                                                                                                                                                          RT_MANIFEST0xdd8380x3efASCII text, with CRLF line terminatorsEnglishGreat Britain0.5074478649453823
                                                                                                                                                                                                                                          DLLImport
                                                                                                                                                                                                                                          WSOCK32.dllgethostbyname, recv, send, socket, inet_ntoa, setsockopt, ntohs, WSACleanup, WSAStartup, sendto, htons, __WSAFDIsSet, select, accept, listen, bind, inet_addr, ioctlsocket, recvfrom, WSAGetLastError, closesocket, gethostname, connect
                                                                                                                                                                                                                                          VERSION.dllGetFileVersionInfoW, VerQueryValueW, GetFileVersionInfoSizeW
                                                                                                                                                                                                                                          WINMM.dlltimeGetTime, waveOutSetVolume, mciSendStringW
                                                                                                                                                                                                                                          COMCTL32.dllImageList_ReplaceIcon, ImageList_Destroy, ImageList_Remove, ImageList_SetDragCursorImage, ImageList_BeginDrag, ImageList_DragEnter, ImageList_DragLeave, ImageList_EndDrag, ImageList_DragMove, InitCommonControlsEx, ImageList_Create
                                                                                                                                                                                                                                          MPR.dllWNetGetConnectionW, WNetCancelConnection2W, WNetUseConnectionW, WNetAddConnection2W
                                                                                                                                                                                                                                          WININET.dllHttpOpenRequestW, InternetCloseHandle, InternetOpenW, InternetSetOptionW, InternetCrackUrlW, HttpQueryInfoW, InternetQueryOptionW, InternetConnectW, HttpSendRequestW, FtpOpenFileW, FtpGetFileSize, InternetOpenUrlW, InternetReadFile, InternetQueryDataAvailable
                                                                                                                                                                                                                                          PSAPI.DLLGetProcessMemoryInfo
                                                                                                                                                                                                                                          IPHLPAPI.DLLIcmpSendEcho, IcmpCloseHandle, IcmpCreateFile
                                                                                                                                                                                                                                          USERENV.dllDestroyEnvironmentBlock, LoadUserProfileW, CreateEnvironmentBlock, UnloadUserProfile
                                                                                                                                                                                                                                          UxTheme.dllIsThemeActive
                                                                                                                                                                                                                                          KERNEL32.dllDuplicateHandle, CreateThread, WaitForSingleObject, HeapAlloc, GetProcessHeap, HeapFree, Sleep, GetCurrentThreadId, MultiByteToWideChar, MulDiv, GetVersionExW, IsWow64Process, GetSystemInfo, FreeLibrary, LoadLibraryA, GetProcAddress, SetErrorMode, GetModuleFileNameW, WideCharToMultiByte, lstrcpyW, lstrlenW, GetModuleHandleW, QueryPerformanceCounter, VirtualFreeEx, OpenProcess, VirtualAllocEx, WriteProcessMemory, ReadProcessMemory, CreateFileW, SetFilePointerEx, SetEndOfFile, ReadFile, WriteFile, FlushFileBuffers, TerminateProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, SetFileTime, GetFileAttributesW, FindFirstFileW, FindClose, GetLongPathNameW, GetShortPathNameW, DeleteFileW, IsDebuggerPresent, CopyFileExW, MoveFileW, CreateDirectoryW, RemoveDirectoryW, SetSystemPowerState, QueryPerformanceFrequency, LoadResource, LockResource, SizeofResource, OutputDebugStringW, GetTempPathW, GetTempFileNameW, DeviceIoControl, LoadLibraryW, GetLocalTime, CompareStringW, GetCurrentThread, EnterCriticalSection, LeaveCriticalSection, GetStdHandle, CreatePipe, InterlockedExchange, TerminateThread, LoadLibraryExW, FindResourceExW, CopyFileW, VirtualFree, FormatMessageW, GetExitCodeProcess, GetPrivateProfileStringW, WritePrivateProfileStringW, GetPrivateProfileSectionW, WritePrivateProfileSectionW, GetPrivateProfileSectionNamesW, FileTimeToLocalFileTime, FileTimeToSystemTime, SystemTimeToFileTime, LocalFileTimeToFileTime, GetDriveTypeW, GetDiskFreeSpaceExW, GetDiskFreeSpaceW, GetVolumeInformationW, SetVolumeLabelW, CreateHardLinkW, SetFileAttributesW, CreateEventW, SetEvent, GetEnvironmentVariableW, SetEnvironmentVariableW, GlobalLock, GlobalUnlock, GlobalAlloc, GetFileSize, GlobalFree, GlobalMemoryStatusEx, Beep, GetSystemDirectoryW, HeapReAlloc, HeapSize, GetComputerNameW, GetWindowsDirectoryW, GetCurrentProcessId, GetProcessIoCounters, CreateProcessW, GetProcessId, SetPriorityClass, VirtualAlloc, GetCurrentDirectoryW, lstrcmpiW, DecodePointer, GetLastError, RaiseException, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, InterlockedDecrement, InterlockedIncrement, ResetEvent, WaitForSingleObjectEx, IsProcessorFeaturePresent, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, CloseHandle, GetFullPathNameW, GetStartupInfoW, GetSystemTimeAsFileTime, InitializeSListHead, RtlUnwind, SetLastError, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, EncodePointer, ExitProcess, GetModuleHandleExW, ExitThread, ResumeThread, FreeLibraryAndExitThread, GetACP, GetDateFormatW, GetTimeFormatW, LCMapStringW, GetStringTypeW, GetFileType, SetStdHandle, GetConsoleCP, GetConsoleMode, ReadConsoleW, GetTimeZoneInformation, FindFirstFileExW, IsValidCodePage, GetOEMCP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, FreeEnvironmentStringsW, SetEnvironmentVariableA, SetCurrentDirectoryW, FindNextFileW, WriteConsoleW
                                                                                                                                                                                                                                          USER32.dllGetKeyboardLayoutNameW, IsCharAlphaW, IsCharAlphaNumericW, IsCharLowerW, IsCharUpperW, GetMenuStringW, GetSubMenu, GetCaretPos, IsZoomed, GetMonitorInfoW, SetWindowLongW, SetLayeredWindowAttributes, FlashWindow, GetClassLongW, TranslateAcceleratorW, IsDialogMessageW, GetSysColor, InflateRect, DrawFocusRect, DrawTextW, FrameRect, DrawFrameControl, FillRect, PtInRect, DestroyAcceleratorTable, CreateAcceleratorTableW, SetCursor, GetWindowDC, GetSystemMetrics, GetActiveWindow, CharNextW, wsprintfW, RedrawWindow, DrawMenuBar, DestroyMenu, SetMenu, GetWindowTextLengthW, CreateMenu, IsDlgButtonChecked, DefDlgProcW, CallWindowProcW, ReleaseCapture, SetCapture, PeekMessageW, GetInputState, UnregisterHotKey, CharLowerBuffW, MonitorFromPoint, MonitorFromRect, LoadImageW, mouse_event, ExitWindowsEx, SetActiveWindow, FindWindowExW, EnumThreadWindows, SetMenuDefaultItem, InsertMenuItemW, IsMenu, ClientToScreen, GetCursorPos, DeleteMenu, CheckMenuRadioItem, GetMenuItemID, GetMenuItemCount, SetMenuItemInfoW, GetMenuItemInfoW, SetForegroundWindow, IsIconic, FindWindowW, SystemParametersInfoW, LockWindowUpdate, SendInput, GetAsyncKeyState, SetKeyboardState, GetKeyboardState, GetKeyState, VkKeyScanW, LoadStringW, DialogBoxParamW, MessageBeep, EndDialog, SendDlgItemMessageW, GetDlgItem, SetWindowTextW, CopyRect, ReleaseDC, GetDC, EndPaint, BeginPaint, GetClientRect, GetMenu, DestroyWindow, EnumWindows, GetDesktopWindow, IsWindow, IsWindowEnabled, IsWindowVisible, EnableWindow, InvalidateRect, GetWindowLongW, GetWindowThreadProcessId, AttachThreadInput, GetFocus, GetWindowTextW, SendMessageTimeoutW, EnumChildWindows, CharUpperBuffW, GetClassNameW, GetParent, GetDlgCtrlID, SendMessageW, MapVirtualKeyW, PostMessageW, GetWindowRect, SetUserObjectSecurity, CloseDesktop, CloseWindowStation, OpenDesktopW, RegisterHotKey, GetCursorInfo, SetWindowPos, CopyImage, AdjustWindowRectEx, SetRect, SetClipboardData, EmptyClipboard, CountClipboardFormats, CloseClipboard, GetClipboardData, IsClipboardFormatAvailable, OpenClipboard, BlockInput, TrackPopupMenuEx, GetMessageW, SetProcessWindowStation, GetProcessWindowStation, OpenWindowStationW, GetUserObjectSecurity, MessageBoxW, DefWindowProcW, MoveWindow, SetFocus, PostQuitMessage, KillTimer, CreatePopupMenu, RegisterWindowMessageW, SetTimer, ShowWindow, CreateWindowExW, RegisterClassExW, LoadIconW, LoadCursorW, GetSysColorBrush, GetForegroundWindow, MessageBoxA, DestroyIcon, DispatchMessageW, keybd_event, TranslateMessage, ScreenToClient
                                                                                                                                                                                                                                          GDI32.dllEndPath, DeleteObject, GetTextExtentPoint32W, ExtCreatePen, StrokeAndFillPath, GetDeviceCaps, SetPixel, CloseFigure, LineTo, AngleArc, MoveToEx, Ellipse, CreateCompatibleBitmap, CreateCompatibleDC, PolyDraw, BeginPath, Rectangle, SetViewportOrgEx, GetObjectW, SetBkMode, RoundRect, SetBkColor, CreatePen, SelectObject, StretchBlt, CreateSolidBrush, SetTextColor, CreateFontW, GetTextFaceW, GetStockObject, CreateDCW, GetPixel, DeleteDC, GetDIBits, StrokePath
                                                                                                                                                                                                                                          COMDLG32.dllGetSaveFileNameW, GetOpenFileNameW
                                                                                                                                                                                                                                          ADVAPI32.dllGetAce, RegEnumValueW, RegDeleteValueW, RegDeleteKeyW, RegEnumKeyExW, RegSetValueExW, RegOpenKeyExW, RegCloseKey, RegQueryValueExW, RegConnectRegistryW, InitializeSecurityDescriptor, InitializeAcl, AdjustTokenPrivileges, OpenThreadToken, OpenProcessToken, LookupPrivilegeValueW, DuplicateTokenEx, CreateProcessAsUserW, CreateProcessWithLogonW, GetLengthSid, CopySid, LogonUserW, AllocateAndInitializeSid, CheckTokenMembership, FreeSid, GetTokenInformation, RegCreateKeyExW, GetSecurityDescriptorDacl, GetAclInformation, GetUserNameW, AddAce, SetSecurityDescriptorDacl, InitiateSystemShutdownExW
                                                                                                                                                                                                                                          SHELL32.dllDragFinish, DragQueryPoint, ShellExecuteExW, DragQueryFileW, SHEmptyRecycleBinW, SHGetPathFromIDListW, SHBrowseForFolderW, SHCreateShellItem, SHGetDesktopFolder, SHGetSpecialFolderLocation, SHGetFolderPathW, SHFileOperationW, ExtractIconExW, Shell_NotifyIconW, ShellExecuteW
                                                                                                                                                                                                                                          ole32.dllCoTaskMemAlloc, CoTaskMemFree, CLSIDFromString, ProgIDFromCLSID, CLSIDFromProgID, OleSetMenuDescriptor, MkParseDisplayName, OleSetContainedObject, CoCreateInstance, IIDFromString, StringFromGUID2, CreateStreamOnHGlobal, OleInitialize, OleUninitialize, CoInitialize, CoUninitialize, GetRunningObjectTable, CoGetInstanceFromFile, CoGetObject, CoInitializeSecurity, CoCreateInstanceEx, CoSetProxyBlanket
                                                                                                                                                                                                                                          OLEAUT32.dllCreateStdDispatch, CreateDispTypeInfo, UnRegisterTypeLib, UnRegisterTypeLibForUser, RegisterTypeLibForUser, RegisterTypeLib, LoadTypeLibEx, VariantCopyInd, SysReAllocString, SysFreeString, VariantChangeType, SafeArrayDestroyData, SafeArrayUnaccessData, SafeArrayAccessData, SafeArrayAllocData, SafeArrayAllocDescriptorEx, SafeArrayCreateVector, SysStringLen, QueryPathOfRegTypeLib, SysAllocString, VariantInit, VariantClear, DispCallFunc, VariantTimeToSystemTime, VarR8FromDec, SafeArrayGetVartype, SafeArrayDestroyDescriptor, VariantCopy, OleLoadPicture
                                                                                                                                                                                                                                          Language of compilation systemCountry where language is spokenMap
                                                                                                                                                                                                                                          EnglishGreat Britain
                                                                                                                                                                                                                                          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                                                                                                                                                          2024-11-01T12:41:00.691166+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow14.175.87.197443192.168.2.449761TCP
                                                                                                                                                                                                                                          2024-11-01T12:41:38.835389+01002022930ET EXPLOIT Possible CVE-2016-2211 Symantec Cab Parsing Buffer Overflow1172.202.163.200443192.168.2.449786TCP
                                                                                                                                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:47.414300919 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:47.414391994 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:47.423105001 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:47.431278944 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:47.431328058 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:48.046314955 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:48.046329975 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:48.046391964 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:48.054516077 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:48.054531097 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:48.054640055 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:48.056250095 CET4434973635.190.72.216192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:48.061763048 CET49736443192.168.2.435.190.72.216
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.479326010 CET49738443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.479402065 CET44349738142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.490396023 CET49738443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.492113113 CET49738443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.492136955 CET44349738142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.840298891 CET4973980192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.845412016 CET804973934.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.847070932 CET4973980192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.847333908 CET4973980192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.851778030 CET49740443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.851926088 CET44349740142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.852358103 CET804973934.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.858156919 CET49740443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.862035990 CET49740443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.862078905 CET44349740142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.196747065 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.196787119 CET4434974135.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.198034048 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.198314905 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.198328972 CET4434974135.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.201877117 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.201889038 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.202106953 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.204047918 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.204062939 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.371084929 CET44349738142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.371131897 CET44349738142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.372222900 CET44349738142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.372333050 CET49738443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.372374058 CET44349738142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.372476101 CET49738443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.451411963 CET804973934.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.506716967 CET4973980192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.520179033 CET49738443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.520211935 CET44349738142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.520319939 CET49738443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.521007061 CET44349738142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.521208048 CET49738443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.539482117 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.539522886 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.547708988 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.549854994 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.549875975 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.579294920 CET4974580192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.584134102 CET804974534.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.584266901 CET4974580192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.584498882 CET4974580192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.589420080 CET804974534.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.677366972 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.677444935 CET4434974634.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.677946091 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.678153992 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.678169012 CET4434974634.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.746726990 CET44349740142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.748256922 CET44349740142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.754544020 CET49740443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.754595995 CET44349740142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.765786886 CET49740443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.765820980 CET44349740142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.765927076 CET49740443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.766251087 CET44349740142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.766318083 CET49740443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.766362906 CET49747443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.766422033 CET44349747142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.766541958 CET49747443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.768470049 CET49747443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.768486977 CET44349747142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.837299109 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.837562084 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.842672110 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.842679977 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.842839003 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.842842102 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.842850924 CET4434974234.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.843348026 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.843374014 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.843460083 CET49742443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.843626976 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.845604897 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.845624924 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.853843927 CET4434974135.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.859519958 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.862781048 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.862787008 CET4434974135.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.863178968 CET4434974135.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.865406990 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.865580082 CET4434974135.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.865643024 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.865649939 CET4434974135.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.865715027 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.865727901 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.865746975 CET49741443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.074523926 CET4973980192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.080249071 CET804973934.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.080761909 CET4973980192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.182023048 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.182065964 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.193434000 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.194736004 CET804974534.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.197983027 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.198021889 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.198117018 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.198359966 CET4434974434.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.199688911 CET4974580192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.199757099 CET49744443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.205182076 CET804974534.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.205971003 CET4974580192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.306032896 CET4434974634.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.306683064 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.311264992 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.311299086 CET4434974634.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.311539888 CET4434974634.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.313817024 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.313936949 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.313945055 CET4434974634.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.313956976 CET4434974634.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.314323902 CET49749443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.314352036 CET4434974934.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.324834108 CET49749443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.330888033 CET49749443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.330900908 CET4434974934.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.394561052 CET49750443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.394658089 CET4434975034.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.409559011 CET49750443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.411737919 CET49750443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.411792994 CET4434975034.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.414664030 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.419584036 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.425107956 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.425405025 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.430536985 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.446072102 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.448976994 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.454536915 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.454564095 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.454627037 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.454751015 CET4434974834.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.457309008 CET49748443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.523329973 CET4434974634.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.523710012 CET49746443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.666320086 CET44349747142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.666435003 CET49747443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.667339087 CET44349747142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.667740107 CET49747443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.672204018 CET49747443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.672240973 CET44349747142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.672358990 CET49747443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.672542095 CET44349747142.250.185.78192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.672849894 CET49747443192.168.2.4142.250.185.78
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.948219061 CET4434974934.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.948239088 CET4434974934.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.959644079 CET49749443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.964576960 CET49749443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.964586020 CET4434974934.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.965199947 CET4434974934.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.969968081 CET49749443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.970155001 CET49749443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.970333099 CET4434974934.160.144.191192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.972469091 CET49749443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.972469091 CET49749443192.168.2.434.160.144.191
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.027681112 CET4434975034.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.027698994 CET4434975034.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.034060001 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.040747881 CET49750443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.091348886 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.113449097 CET49750443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.113502026 CET4434975034.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.113651991 CET49750443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.113970995 CET4434975034.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.114188910 CET49754443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.114239931 CET4434975434.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.118072987 CET49750443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.118124962 CET49754443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.120440960 CET49754443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.120485067 CET4434975434.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.663446903 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.668948889 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.669372082 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.669493914 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.675411940 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.745748997 CET4434975434.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.745830059 CET49754443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.750296116 CET49754443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.750314951 CET4434975434.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.750376940 CET49754443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.750597000 CET4434975434.117.188.166192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.750653028 CET49754443192.168.2.434.117.188.166
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.817970991 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.824248075 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.946863890 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.968722105 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.990962982 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.991347075 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.996082067 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.996566057 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.996712923 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.001770973 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.016881943 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.153213024 CET804975534.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.154222965 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.159522057 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.160645962 CET4975580192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.189925909 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.190021992 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.190598011 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.191791058 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.191819906 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.280718088 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.329926014 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.624560118 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.677674055 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.813293934 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.814815044 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.820039988 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.820071936 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.820126057 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.820427895 CET4434975734.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.820481062 CET49757443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.324899912 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.324943066 CET4434975835.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.325397968 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.325963974 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.325973988 CET4434975835.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.339437008 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.344413996 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.351603985 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.356694937 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.358316898 CET49759443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.358376980 CET4434975934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.359178066 CET49759443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.360693932 CET49759443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.360733032 CET4434975934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.366121054 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.366187096 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.366869926 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.368184090 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.368221998 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.471306086 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.477897882 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.521923065 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.522155046 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.646341085 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.652977943 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.779110909 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.821738958 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.951867104 CET4434975835.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.954121113 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.963701963 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.963740110 CET4434975835.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.964006901 CET4434975835.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.965702057 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.965877056 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.965917110 CET4434975835.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.966610909 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.966610909 CET49758443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.992206097 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.995328903 CET4434975934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.998058081 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.998136044 CET49759443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:57.015397072 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:57.015441895 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:57.015472889 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:57.015777111 CET4434976034.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:57.017786980 CET49759443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:57.017832994 CET4434975934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:57.017868996 CET49759443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:57.018337965 CET4434975934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:57.022366047 CET49760443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:57.022372961 CET49759443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.121897936 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.127685070 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.140752077 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.140798092 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.141056061 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.141189098 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.141199112 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.141997099 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.142050028 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.142198086 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.143351078 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.143363953 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.144654989 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.144712925 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.145112038 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.145232916 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.145263910 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.249440908 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.291986942 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.430464029 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.435908079 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.563781023 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.608469963 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.745518923 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.745654106 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.752002001 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.752085924 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.767182112 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.767353058 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.207320929 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.207353115 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.208319902 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.210321903 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.210372925 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.210690975 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.213778019 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.213876963 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.213905096 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.213944912 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.214097023 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.214180946 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.214191914 CET4434976434.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.214231968 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.214344978 CET4434976334.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.214396954 CET4434976534.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.214611053 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.214633942 CET49764443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.214643002 CET49763443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.214656115 CET49765443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.951342106 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.951390982 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.951769114 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.951814890 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.957580090 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.957591057 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.957930088 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.957943916 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.958019018 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:01.958035946 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.181216955 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.183231115 CET49771443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.183269978 CET4434977134.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.184006929 CET49771443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.185327053 CET49771443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.185338974 CET4434977134.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.186501026 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.238425016 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.238492012 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.238729954 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.239954948 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.239995956 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.309583902 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.351171970 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.430880070 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.435993910 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.562299013 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.565913916 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.567428112 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.570270061 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.570281029 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.570513964 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.571662903 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.571872950 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.574115038 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.574125051 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.574999094 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.575323105 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.575395107 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.575561047 CET4434976934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.576366901 CET49769443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.577071905 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.577140093 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.577291965 CET4434977034.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.577430010 CET49770443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.614234924 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.722250938 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.727658987 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.804467916 CET4434977134.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.804538965 CET49771443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.849353075 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.857924938 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.858010054 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.899564981 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:03.653131008 CET49771443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:03.653228998 CET4434977134.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:03.653291941 CET49771443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:03.653529882 CET4434977134.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:03.653562069 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:03.653635979 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:03.653687000 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:03.653912067 CET4434977234.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:03.654923916 CET49771443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:03.654948950 CET49772443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:04.293217897 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:04.298470020 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:04.425836086 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:04.458249092 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:04.463541985 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:04.472841978 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:04.585712910 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:04.635646105 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.664231062 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.669562101 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.796506882 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.839124918 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:14.593420982 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:14.599756956 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:14.630399942 CET49774443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:14.630491018 CET4434977434.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:14.630656004 CET49774443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:14.632136106 CET49774443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:14.632173061 CET4434977434.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.279598951 CET4434977434.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.279707909 CET49774443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.283401966 CET49774443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.283441067 CET4434977434.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.283490896 CET49774443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.283659935 CET4434977434.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.284609079 CET49774443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.285978079 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.290911913 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.412704945 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.420567989 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.425718069 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.464672089 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.552395105 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.596198082 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.736741066 CET49775443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.736836910 CET4434977535.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.740353107 CET49775443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.740453959 CET49775443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.740474939 CET4434977535.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.759814024 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.759906054 CET4434977634.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.760037899 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.760154963 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.760179043 CET4434977634.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.773631096 CET49777443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.773674965 CET44349777151.101.193.91192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.779211044 CET49777443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.779359102 CET49777443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.779388905 CET44349777151.101.193.91192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.794610023 CET49778443192.168.2.435.190.72.216
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.794631004 CET4434977835.190.72.216192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.796798944 CET49778443192.168.2.435.190.72.216
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.798372030 CET49778443192.168.2.435.190.72.216
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.798384905 CET4434977835.190.72.216192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.818573952 CET49779443192.168.2.435.201.103.21
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.818614960 CET4434977935.201.103.21192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.825349092 CET49779443192.168.2.435.201.103.21
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.826833010 CET49779443192.168.2.435.201.103.21
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.826848030 CET4434977935.201.103.21192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.359169960 CET4434977535.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.359303951 CET49775443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.362509966 CET49775443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.362520933 CET4434977535.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.362761974 CET4434977535.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.364666939 CET49775443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.364761114 CET49775443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.364840031 CET4434977535.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.364948988 CET49775443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.367568970 CET4434977634.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.367769003 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.370584965 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.370615959 CET4434977634.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.370836020 CET4434977634.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.370898008 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.372881889 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.372991085 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.373037100 CET4434977634.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.373133898 CET49776443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.375809908 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.402585983 CET44349777151.101.193.91192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.402709007 CET49777443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.405654907 CET49777443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.405663967 CET44349777151.101.193.91192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.405960083 CET44349777151.101.193.91192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.407733917 CET49777443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.407824039 CET49777443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.407911062 CET44349777151.101.193.91192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.414057016 CET49777443192.168.2.4151.101.193.91
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.418349028 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.418389082 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.420907021 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.420948029 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.422602892 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.422620058 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.425040960 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.425043106 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.425209999 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.425209999 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.425226927 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.425432920 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.425455093 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.425522089 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.425535917 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.444181919 CET4434977835.190.72.216192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.446794033 CET49778443192.168.2.435.190.72.216
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.449423075 CET4434977935.201.103.21192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.449429989 CET4434977935.201.103.21192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.449476004 CET49779443192.168.2.435.201.103.21
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.452964067 CET49778443192.168.2.435.190.72.216
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.452994108 CET4434977835.190.72.216192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.453039885 CET49778443192.168.2.435.190.72.216
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.453490973 CET4434977835.190.72.216192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.454998016 CET49779443192.168.2.435.201.103.21
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.455004930 CET4434977935.201.103.21192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.455068111 CET49779443192.168.2.435.201.103.21
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.455353022 CET4434977935.201.103.21192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.455949068 CET49778443192.168.2.435.190.72.216
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.456999063 CET49779443192.168.2.435.201.103.21
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.466166019 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.466202974 CET4434978334.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.466358900 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.466453075 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.466466904 CET4434978334.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.497935057 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.506880999 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.512687922 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.552166939 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.639020920 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.683687925 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.028417110 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.028481007 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.031156063 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.031166077 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.031505108 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.033822060 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.033920050 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.034039021 CET4434978135.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.034898043 CET49781443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.036727905 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.041110992 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.041186094 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.041696072 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.043602943 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.043613911 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.043819904 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.046096087 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.046176910 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.046255112 CET4434978235.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.046314001 CET49782443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.069415092 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.069432020 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.069475889 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.072180033 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.072185993 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.072505951 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.074424028 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.074503899 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.074623108 CET4434978035.244.181.201192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.077039957 CET49780443192.168.2.435.244.181.201
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.086296082 CET4434978334.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.086361885 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.088785887 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.088795900 CET4434978334.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.089016914 CET4434978334.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.091423035 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.091496944 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.091548920 CET4434978334.149.100.209192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.091644049 CET49783443192.168.2.434.149.100.209
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.162708998 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.165553093 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.170492887 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.216393948 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.296854019 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.354556084 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:27.182815075 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:27.187998056 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:27.314373970 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:27.320652962 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:35.399662018 CET49785443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:35.399693012 CET4434978534.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:35.399852037 CET49785443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:35.401417971 CET49785443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:35.401429892 CET4434978534.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.012110949 CET4434978534.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.012209892 CET49785443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.017206907 CET49785443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.017215967 CET4434978534.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.017322063 CET49785443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.017416000 CET4434978534.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.017935991 CET49785443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.019833088 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.025357008 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.148777962 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.151721954 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.157574892 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.208728075 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.283536911 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.324673891 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:41.111885071 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:41.117039919 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:41.238481998 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:41.241311073 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:41.246437073 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:41.285871983 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:41.372174978 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:41.423979044 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.029546976 CET49804443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.029591084 CET4434980434.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.029705048 CET49805443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.029747009 CET4434980534.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.030284882 CET49804443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.030596972 CET49804443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.030599117 CET49805443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.030631065 CET4434980434.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.030733109 CET49805443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.030761003 CET4434980534.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.031439066 CET49806443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.031461954 CET4434980634.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.031625032 CET49806443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.031780005 CET49806443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.031791925 CET4434980634.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.647105932 CET4434980434.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.647370100 CET49804443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.650605917 CET49804443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.650615931 CET4434980434.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.650851965 CET4434980434.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.652920961 CET49804443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.653003931 CET49804443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.653064966 CET4434980434.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.654236078 CET4434980634.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.654525042 CET49804443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.654525042 CET49804443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.654546022 CET49806443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.657629967 CET49806443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.657635927 CET4434980634.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.657869101 CET4434980634.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.660139084 CET49806443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.660214901 CET49806443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.660281897 CET4434980634.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.660978079 CET49806443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.672213078 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.677402020 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.680792093 CET4434980534.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.684063911 CET49805443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.687365055 CET49805443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.687388897 CET4434980534.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.687663078 CET4434980534.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.692679882 CET49805443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.692750931 CET49805443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.692892075 CET4434980534.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.700289011 CET49805443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.700349092 CET49805443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.799622059 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.821368933 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.828505993 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.839559078 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.962837934 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:47.020812035 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:56.810308933 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:56.815459013 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:56.976327896 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:56.982023001 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:06.819905996 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:06.825203896 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:06.989387989 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:06.994385958 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.264177084 CET49967443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.264270067 CET4434996734.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.264596939 CET49967443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.265969992 CET49967443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.266009092 CET4434996734.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.832967043 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.838294029 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.875619888 CET4434996734.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.881454945 CET49967443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.886816978 CET49967443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.886841059 CET4434996734.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.886954069 CET49967443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.886970043 CET4434996734.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.887845993 CET49967443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.889604092 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.895432949 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:17.002389908 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:17.007364988 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:17.017625093 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:17.021460056 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:17.027966022 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:17.064889908 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:17.154304028 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:17.202941895 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:27.030709028 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:27.035504103 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:27.162394047 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:27.168051004 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:37.043943882 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:37.049695015 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:37.175472975 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:37.182178974 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:47.050951958 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:47.056551933 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:47.189126968 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:47.195477962 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:57.064014912 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:57.068918943 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:57.202064037 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:57.206947088 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:07.076771975 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:07.081784964 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:07.208312988 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:07.213335037 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:17.089317083 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:17.094250917 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:17.220741987 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:17.225719929 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:27.101763010 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:27.106698990 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:27.233107090 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:27.239317894 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.115358114 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.120312929 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.246768951 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.251893997 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.438602924 CET50058443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.438648939 CET4435005834.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.438812971 CET50058443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.440383911 CET50058443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.440401077 CET4435005834.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.059525967 CET4435005834.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.059643984 CET50058443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.065810919 CET50058443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.065823078 CET4435005834.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.065900087 CET50058443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.066062927 CET4435005834.107.243.93192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.067409992 CET50058443192.168.2.434.107.243.93
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.068862915 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.074421883 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.195955992 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.200334072 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.205215931 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.249641895 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.330923080 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.381316900 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909012079 CET50059443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909061909 CET4435005934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909231901 CET50060443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909297943 CET4435006034.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909356117 CET50061443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909394026 CET4435006134.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909529924 CET50062443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909549952 CET4435006234.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909816980 CET50061443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909817934 CET50059443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909821987 CET50062443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909821987 CET50060443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909956932 CET50059443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909970999 CET4435005934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.910161018 CET50061443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.910173893 CET4435006134.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.910262108 CET50060443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.910298109 CET4435006034.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.910341024 CET50062443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.910357952 CET4435006234.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.522238970 CET4435006234.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.522356987 CET50062443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.524079084 CET4435006034.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.524149895 CET50060443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.539920092 CET4435006134.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.539984941 CET50061443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.545247078 CET50062443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.545269966 CET4435006234.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.545473099 CET4435006234.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.547691107 CET50061443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.547698021 CET4435006134.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.548019886 CET4435006134.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.549859047 CET50060443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.549871922 CET4435006034.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.550039053 CET4435006034.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.553189993 CET50062443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.553319931 CET50062443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.553343058 CET4435006234.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.553550005 CET50060443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.553607941 CET50060443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.553656101 CET4435006034.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.553901911 CET50061443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.553972006 CET50061443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.554109097 CET4435006134.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.555002928 CET50062443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.555002928 CET50060443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.555020094 CET50061443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.556490898 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.559870005 CET4435005934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.559948921 CET50059443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.562916994 CET50059443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.562927961 CET4435005934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.563157082 CET4435005934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.565234900 CET50059443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.565303087 CET50059443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.565383911 CET4435005934.120.208.123192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.565906048 CET50059443192.168.2.434.120.208.123
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.567065954 CET5006380192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.569694996 CET804975134.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.569755077 CET4975180192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.573605061 CET805006334.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.573666096 CET5006380192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.573786974 CET5006380192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.579499960 CET805006334.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.177473068 CET805006334.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.180079937 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.180603981 CET5006480192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.185657024 CET805006434.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.185724974 CET5006480192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.185867071 CET5006480192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.186232090 CET804975634.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.186306000 CET4975680192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.191096067 CET805006434.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.228446007 CET5006380192.168.2.434.107.221.82
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.784909010 CET805006434.107.221.82192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.831511974 CET5006480192.168.2.434.107.221.82
                                                                                                                                                                                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:47.415231943 CET5094353192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:47.423352003 CET53509431.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:47.425597906 CET5229553192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:47.432738066 CET53522951.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.383550882 CET5441253192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.384412050 CET5206153192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.393105984 CET53520611.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.471086025 CET6301753192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.478538990 CET53630171.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.480211973 CET5942653192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.487068892 CET53594261.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.494389057 CET4966053192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.494868040 CET5180153192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.501498938 CET53496601.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.501676083 CET53518011.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.193278074 CET4926953192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.197649956 CET5566553192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.200115919 CET53492691.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.205416918 CET53556651.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.205456972 CET5283853192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.206558943 CET5044253192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.213428020 CET53528381.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.213836908 CET53504421.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.216905117 CET6371753192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.224704027 CET53637171.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.523307085 CET4963953192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.530841112 CET53496391.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.536535025 CET5438153192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.539612055 CET6482853192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.543540955 CET53543811.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.546597958 CET53648281.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.551179886 CET5154753192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.560787916 CET53515471.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.565260887 CET6128353192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.582520008 CET6476353192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.589679003 CET53647631.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.669236898 CET6266153192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.676282883 CET53626611.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.677854061 CET6343853192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.685251951 CET53634381.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.685973883 CET4957653192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.693227053 CET53495761.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.953032017 CET5744553192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.014139891 CET53614751.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.157558918 CET5965553192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.164732933 CET53596551.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.172657967 CET5716253192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.179688931 CET53571621.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.181731939 CET5912553192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.188745975 CET53591251.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.317004919 CET6006453192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.317610979 CET5678153192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.324465990 CET53600641.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.325125933 CET53567811.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.325937986 CET5817353192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.333837032 CET53581731.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.334316015 CET5614453192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.341736078 CET53561441.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.357558012 CET5415853192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.358674049 CET5548153192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.365375042 CET53541581.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.365638971 CET53554811.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.366611004 CET5359653192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.370436907 CET6020353192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.374058962 CET53535961.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.377756119 CET53602031.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.388894081 CET5567953192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.395653963 CET53556791.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:59.187412977 CET5148653192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.183608055 CET5247453192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.191101074 CET53524741.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.242326975 CET6098653192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.255363941 CET53609861.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.676788092 CET5447353192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.676788092 CET5630753192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.677095890 CET6155153192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET53544731.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684910059 CET53563071.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684922934 CET53615511.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.717042923 CET5684153192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.717165947 CET5800953192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.717308044 CET5321453192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724710941 CET53568411.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET53580091.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.725752115 CET5493953192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.725811005 CET6302153192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.729300022 CET53532141.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.729748964 CET5186953192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.734905005 CET53630211.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.735279083 CET53549391.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.735410929 CET5609353192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.735765934 CET5509653192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.739378929 CET53518691.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.744245052 CET53550961.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.744277000 CET53560931.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.745970964 CET5461153192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.746062040 CET5649153192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.753863096 CET53546111.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.754268885 CET5814953192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.754697084 CET53564911.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.755148888 CET5638653192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.763094902 CET53581491.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.763427019 CET53563861.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:14.630592108 CET5861153192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:14.639898062 CET53586111.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.286365032 CET6008953192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.737591982 CET5441353192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.745084047 CET53544131.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.745639086 CET5121453192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.753717899 CET53512141.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.756817102 CET6311553192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.766200066 CET53631151.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.774158955 CET6357953192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.783233881 CET53635791.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.793869972 CET5939553192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.795344114 CET6054953192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.802922964 CET53593951.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.803181887 CET53605491.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.819363117 CET5319553192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.828241110 CET53531951.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.839575052 CET5450553192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.848339081 CET53545051.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:35.387531042 CET5274753192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:35.398539066 CET53527471.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:35.399104118 CET5753653192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:35.406133890 CET53575361.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.020103931 CET5886953192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.011105061 CET5487453192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.020246029 CET53548741.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.252558947 CET5290053192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.263151884 CET53529001.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.264175892 CET6216553192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.271543026 CET53621651.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.889830112 CET5821153192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.422818899 CET5450753192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.429764986 CET53545071.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.430834055 CET6204453192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.437757969 CET53620441.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.438246012 CET6488053192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.446093082 CET53648801.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.069097042 CET5510253192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909430027 CET5591453192.168.2.41.1.1.1
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.917524099 CET53559141.1.1.1192.168.2.4
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.556917906 CET6086253192.168.2.41.1.1.1
                                                                                                                                                                                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:47.415231943 CET192.168.2.41.1.1.10xa83dStandard query (0)prod.classify-client.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:47.425597906 CET192.168.2.41.1.1.10x4c84Standard query (0)prod.classify-client.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.383550882 CET192.168.2.41.1.1.10xb49Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.384412050 CET192.168.2.41.1.1.10xbdc6Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.471086025 CET192.168.2.41.1.1.10x8402Standard query (0)prod.detectportal.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.480211973 CET192.168.2.41.1.1.10x40b5Standard query (0)youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.494389057 CET192.168.2.41.1.1.10x54f0Standard query (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.494868040 CET192.168.2.41.1.1.10xbc71Standard query (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.193278074 CET192.168.2.41.1.1.10xe03cStandard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.197649956 CET192.168.2.41.1.1.10xf9baStandard query (0)prod.balrog.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.205456972 CET192.168.2.41.1.1.10xd25aStandard query (0)contile.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.206558943 CET192.168.2.41.1.1.10xf026Standard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.216905117 CET192.168.2.41.1.1.10x9486Standard query (0)contile.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.523307085 CET192.168.2.41.1.1.10xe018Standard query (0)spocs.getpocket.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.536535025 CET192.168.2.41.1.1.10x12efStandard query (0)example.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.539612055 CET192.168.2.41.1.1.10xc5bcStandard query (0)ipv4only.arpaA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.551179886 CET192.168.2.41.1.1.10x88f4Standard query (0)prod.ads.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.565260887 CET192.168.2.41.1.1.10xf864Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.582520008 CET192.168.2.41.1.1.10xd553Standard query (0)prod.ads.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.669236898 CET192.168.2.41.1.1.10xfe26Standard query (0)content-signature-2.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.677854061 CET192.168.2.41.1.1.10x9a5Standard query (0)prod.content-signature-chains.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.685973883 CET192.168.2.41.1.1.10x4e8dStandard query (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.953032017 CET192.168.2.41.1.1.10x512bStandard query (0)shavar.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.157558918 CET192.168.2.41.1.1.10xcba9Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.172657967 CET192.168.2.41.1.1.10x6a81Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.181731939 CET192.168.2.41.1.1.10xa3eStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.317004919 CET192.168.2.41.1.1.10xa6d4Standard query (0)support.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.317610979 CET192.168.2.41.1.1.10xb02aStandard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.325937986 CET192.168.2.41.1.1.10xeebaStandard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.334316015 CET192.168.2.41.1.1.10x39a6Standard query (0)us-west1.prod.sumo.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.357558012 CET192.168.2.41.1.1.10x246cStandard query (0)firefox.settings.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.358674049 CET192.168.2.41.1.1.10xa5a4Standard query (0)telemetry-incoming.r53-2.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.366611004 CET192.168.2.41.1.1.10xafa8Standard query (0)prod.remote-settings.prod.webservices.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.370436907 CET192.168.2.41.1.1.10xe6f6Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.388894081 CET192.168.2.41.1.1.10x5d88Standard query (0)prod.remote-settings.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:59.187412977 CET192.168.2.41.1.1.10x579fStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.183608055 CET192.168.2.41.1.1.10x498fStandard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.242326975 CET192.168.2.41.1.1.10x1f27Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.676788092 CET192.168.2.41.1.1.10x370bStandard query (0)www.youtube.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.676788092 CET192.168.2.41.1.1.10x8681Standard query (0)www.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.677095890 CET192.168.2.41.1.1.10x65dfStandard query (0)www.wikipedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.717042923 CET192.168.2.41.1.1.10x3f53Standard query (0)star-mini.c10r.facebook.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.717165947 CET192.168.2.41.1.1.10x69beStandard query (0)youtube-ui.l.google.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.717308044 CET192.168.2.41.1.1.10xbc10Standard query (0)dyna.wikimedia.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.725752115 CET192.168.2.41.1.1.10x70beStandard query (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.725811005 CET192.168.2.41.1.1.10x416aStandard query (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.729748964 CET192.168.2.41.1.1.10xe057Standard query (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.735410929 CET192.168.2.41.1.1.10x9d9fStandard query (0)www.reddit.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.735765934 CET192.168.2.41.1.1.10x634aStandard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.745970964 CET192.168.2.41.1.1.10x6527Standard query (0)twitter.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.746062040 CET192.168.2.41.1.1.10x9ecdStandard query (0)reddit.map.fastly.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.754268885 CET192.168.2.41.1.1.10x6260Standard query (0)twitter.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.755148888 CET192.168.2.41.1.1.10xdab1Standard query (0)reddit.map.fastly.net28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:14.630592108 CET192.168.2.41.1.1.10xc310Standard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.286365032 CET192.168.2.41.1.1.10x30caStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.737591982 CET192.168.2.41.1.1.10xfd91Standard query (0)prod.balrog.prod.cloudops.mozgcp.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.745639086 CET192.168.2.41.1.1.10xe71cStandard query (0)prod.balrog.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.756817102 CET192.168.2.41.1.1.10x1284Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.774158955 CET192.168.2.41.1.1.10x7c36Standard query (0)services.addons.mozilla.orgA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.793869972 CET192.168.2.41.1.1.10x5a24Standard query (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.795344114 CET192.168.2.41.1.1.10x3da9Standard query (0)normandy.cdn.mozilla.netA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.819363117 CET192.168.2.41.1.1.10xc4ecStandard query (0)normandy-cdn.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.839575052 CET192.168.2.41.1.1.10xb683Standard query (0)normandy-cdn.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:35.387531042 CET192.168.2.41.1.1.10xe60fStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:35.399104118 CET192.168.2.41.1.1.10x60daStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.020103931 CET192.168.2.41.1.1.10xbdc6Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.011105061 CET192.168.2.41.1.1.10xb83dStandard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.252558947 CET192.168.2.41.1.1.10x333bStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.264175892 CET192.168.2.41.1.1.10x161fStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.889830112 CET192.168.2.41.1.1.10x823Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.422818899 CET192.168.2.41.1.1.10xa6cbStandard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.430834055 CET192.168.2.41.1.1.10xb7a6Standard query (0)push.services.mozilla.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.438246012 CET192.168.2.41.1.1.10x687eStandard query (0)push.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.069097042 CET192.168.2.41.1.1.10xb2c8Standard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.909430027 CET192.168.2.41.1.1.10xf093Standard query (0)telemetry-incoming.r53-2.services.mozilla.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.556917906 CET192.168.2.41.1.1.10x361bStandard query (0)detectportal.firefox.comA (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:47.407183886 CET1.1.1.1192.168.2.40xa012No error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:47.423352003 CET1.1.1.1192.168.2.40xa83dNo error (0)prod.classify-client.prod.webservices.mozgcp.net35.190.72.216A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.392854929 CET1.1.1.1192.168.2.40xb49No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.392854929 CET1.1.1.1192.168.2.40xb49No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.393105984 CET1.1.1.1192.168.2.40xbdc6No error (0)youtube.com142.250.185.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.478538990 CET1.1.1.1192.168.2.40x8402No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.487068892 CET1.1.1.1192.168.2.40x40b5No error (0)youtube.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.501498938 CET1.1.1.1192.168.2.40x54f0No error (0)prod.detectportal.prod.cloudops.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.501676083 CET1.1.1.1192.168.2.40xbc71No error (0)youtube.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.191026926 CET1.1.1.1192.168.2.40xff5bNo error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.191026926 CET1.1.1.1192.168.2.40xff5bNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.200115919 CET1.1.1.1192.168.2.40xe03cNo error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.205416918 CET1.1.1.1192.168.2.40xf9baNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.213428020 CET1.1.1.1192.168.2.40xd25aNo error (0)contile.services.mozilla.com34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.530841112 CET1.1.1.1192.168.2.40xe018No error (0)spocs.getpocket.comprod.ads.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.530841112 CET1.1.1.1192.168.2.40xe018No error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.543540955 CET1.1.1.1192.168.2.40x12efNo error (0)example.org93.184.215.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.546597958 CET1.1.1.1192.168.2.40xc5bcNo error (0)ipv4only.arpa192.0.0.170A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.546597958 CET1.1.1.1192.168.2.40xc5bcNo error (0)ipv4only.arpa192.0.0.171A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.560787916 CET1.1.1.1192.168.2.40x88f4No error (0)prod.ads.prod.webservices.mozgcp.net34.117.188.166A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.573293924 CET1.1.1.1192.168.2.40xf864No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.573293924 CET1.1.1.1192.168.2.40xf864No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.676282883 CET1.1.1.1192.168.2.40xfe26No error (0)content-signature-2.cdn.mozilla.netcontent-signature-chains.prod.autograph.services.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.676282883 CET1.1.1.1192.168.2.40xfe26No error (0)content-signature-chains.prod.autograph.services.mozaws.netprod.content-signature-chains.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.676282883 CET1.1.1.1192.168.2.40xfe26No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.685251951 CET1.1.1.1192.168.2.40x9a5No error (0)prod.content-signature-chains.prod.webservices.mozgcp.net34.160.144.191A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.693227053 CET1.1.1.1192.168.2.40x4e8dNo error (0)prod.content-signature-chains.prod.webservices.mozgcp.net28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.961144924 CET1.1.1.1192.168.2.40x512bNo error (0)shavar.services.mozilla.comshavar.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.164732933 CET1.1.1.1192.168.2.40xcba9No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.179688931 CET1.1.1.1192.168.2.40x6a81No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.321943998 CET1.1.1.1192.168.2.40xc4b4No error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.321943998 CET1.1.1.1192.168.2.40xc4b4No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.324465990 CET1.1.1.1192.168.2.40xa6d4No error (0)support.mozilla.orgprod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.324465990 CET1.1.1.1192.168.2.40xa6d4No error (0)prod.sumo.prod.webservices.mozgcp.netus-west1.prod.sumo.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.324465990 CET1.1.1.1192.168.2.40xa6d4No error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.333837032 CET1.1.1.1192.168.2.40xeebaNo error (0)us-west1.prod.sumo.prod.webservices.mozgcp.net34.149.128.2A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.346204996 CET1.1.1.1192.168.2.40xb410No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.365375042 CET1.1.1.1192.168.2.40x246cNo error (0)firefox.settings.services.mozilla.comprod.remote-settings.prod.webservices.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.365375042 CET1.1.1.1192.168.2.40x246cNo error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.365638971 CET1.1.1.1192.168.2.40xa5a4No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.374058962 CET1.1.1.1192.168.2.40xafa8No error (0)prod.remote-settings.prod.webservices.mozgcp.net34.149.100.209A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:59.194679976 CET1.1.1.1192.168.2.40x579fNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:59.194679976 CET1.1.1.1192.168.2.40x579fNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.135752916 CET1.1.1.1192.168.2.40xbc00No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)www.youtube.comyoutube-ui.l.google.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com142.250.185.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com142.250.185.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com142.250.74.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com216.58.206.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com216.58.206.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684734106 CET1.1.1.1192.168.2.40x370bNo error (0)youtube-ui.l.google.com216.58.212.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684910059 CET1.1.1.1192.168.2.40x8681No error (0)www.facebook.comstar-mini.c10r.facebook.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684910059 CET1.1.1.1192.168.2.40x8681No error (0)star-mini.c10r.facebook.com157.240.251.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684922934 CET1.1.1.1192.168.2.40x65dfNo error (0)www.wikipedia.orgdyna.wikimedia.orgCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.684922934 CET1.1.1.1192.168.2.40x65dfNo error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724710941 CET1.1.1.1192.168.2.40x3f53No error (0)star-mini.c10r.facebook.com157.240.0.35A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com172.217.18.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com142.250.184.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com172.217.18.14A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com142.250.186.78A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com142.250.181.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com142.250.186.46A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com142.250.186.110A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com172.217.16.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com142.250.184.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com142.250.186.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com142.250.185.238A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com142.250.185.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com172.217.16.142A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com142.250.185.206A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com142.250.185.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.724781036 CET1.1.1.1192.168.2.40x69beNo error (0)youtube-ui.l.google.com142.250.186.174A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.729300022 CET1.1.1.1192.168.2.40xbc10No error (0)dyna.wikimedia.org185.15.59.224A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.734905005 CET1.1.1.1192.168.2.40x416aNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.734905005 CET1.1.1.1192.168.2.40x416aNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.734905005 CET1.1.1.1192.168.2.40x416aNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.734905005 CET1.1.1.1192.168.2.40x416aNo error (0)youtube-ui.l.google.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.735279083 CET1.1.1.1192.168.2.40x70beNo error (0)star-mini.c10r.facebook.com28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.739378929 CET1.1.1.1192.168.2.40xe057No error (0)dyna.wikimedia.org28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.744245052 CET1.1.1.1192.168.2.40x634aNo error (0)twitter.com104.244.42.129A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.744277000 CET1.1.1.1192.168.2.40x9d9fNo error (0)www.reddit.comreddit.map.fastly.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.744277000 CET1.1.1.1192.168.2.40x9d9fNo error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.744277000 CET1.1.1.1192.168.2.40x9d9fNo error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.744277000 CET1.1.1.1192.168.2.40x9d9fNo error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.744277000 CET1.1.1.1192.168.2.40x9d9fNo error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.753863096 CET1.1.1.1192.168.2.40x6527No error (0)twitter.com104.244.42.65A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.754697084 CET1.1.1.1192.168.2.40x9ecdNo error (0)reddit.map.fastly.net151.101.193.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.754697084 CET1.1.1.1192.168.2.40x9ecdNo error (0)reddit.map.fastly.net151.101.65.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.754697084 CET1.1.1.1192.168.2.40x9ecdNo error (0)reddit.map.fastly.net151.101.129.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.754697084 CET1.1.1.1192.168.2.40x9ecdNo error (0)reddit.map.fastly.net151.101.1.140A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.293718100 CET1.1.1.1192.168.2.40x30caNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.293718100 CET1.1.1.1192.168.2.40x30caNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.744421959 CET1.1.1.1192.168.2.40x647aNo error (0)balrog-aus5.r53-2.services.mozilla.comprod.balrog.prod.cloudops.mozgcp.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.744421959 CET1.1.1.1192.168.2.40x647aNo error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.745084047 CET1.1.1.1192.168.2.40xfd91No error (0)prod.balrog.prod.cloudops.mozgcp.net35.244.181.201A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.766200066 CET1.1.1.1192.168.2.40x1284No error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.766200066 CET1.1.1.1192.168.2.40x1284No error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.766200066 CET1.1.1.1192.168.2.40x1284No error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.766200066 CET1.1.1.1192.168.2.40x1284No error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.783233881 CET1.1.1.1192.168.2.40x7c36No error (0)services.addons.mozilla.org151.101.65.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.783233881 CET1.1.1.1192.168.2.40x7c36No error (0)services.addons.mozilla.org151.101.1.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.783233881 CET1.1.1.1192.168.2.40x7c36No error (0)services.addons.mozilla.org151.101.129.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.783233881 CET1.1.1.1192.168.2.40x7c36No error (0)services.addons.mozilla.org151.101.193.91A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.802922964 CET1.1.1.1192.168.2.40x5a24No error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.802922964 CET1.1.1.1192.168.2.40x5a24No error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.802922964 CET1.1.1.1192.168.2.40x5a24No error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.802922964 CET1.1.1.1192.168.2.40x5a24No error (0)services.addons.mozilla.org28IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.803181887 CET1.1.1.1192.168.2.40x3da9No error (0)normandy.cdn.mozilla.netnormandy-cdn.services.mozilla.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.803181887 CET1.1.1.1192.168.2.40x3da9No error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.828241110 CET1.1.1.1192.168.2.40xc4ecNo error (0)normandy-cdn.services.mozilla.com35.201.103.21A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.086440086 CET1.1.1.1192.168.2.40x962cNo error (0)a21ed24aedde648804e7-228765c84088fef4ff5e70f2710398e9.r17.cf1.rackcdn.coma17.rackcdn.comCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.086440086 CET1.1.1.1192.168.2.40x962cNo error (0)a17.rackcdn.coma17.rackcdn.com.mdc.edgesuite.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:35.398539066 CET1.1.1.1192.168.2.40xe60fNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.027738094 CET1.1.1.1192.168.2.40xbdc6No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.027738094 CET1.1.1.1192.168.2.40xbdc6No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.020207882 CET1.1.1.1192.168.2.40x2d4fNo error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.263151884 CET1.1.1.1192.168.2.40x333bNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.898924112 CET1.1.1.1192.168.2.40x823No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.898924112 CET1.1.1.1192.168.2.40x823No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.429764986 CET1.1.1.1192.168.2.40xa6cbNo error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:37.437757969 CET1.1.1.1192.168.2.40xb7a6No error (0)push.services.mozilla.com34.107.243.93A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.076570034 CET1.1.1.1192.168.2.40xb2c8No error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.076570034 CET1.1.1.1192.168.2.40xb2c8No error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:46.907910109 CET1.1.1.1192.168.2.40x4231No error (0)telemetry-incoming.r53-2.services.mozilla.com34.120.208.123A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.565757990 CET1.1.1.1192.168.2.40x361bNo error (0)detectportal.firefox.comdetectportal.prod.mozaws.netCNAME (Canonical name)IN (0x0001)false
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.565757990 CET1.1.1.1192.168.2.40x361bNo error (0)prod.detectportal.prod.cloudops.mozgcp.net34.107.221.82A (IP address)IN (0x0001)false
                                                                                                                                                                                                                                          • detectportal.firefox.com
                                                                                                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                          0192.168.2.44973934.107.221.82804828C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:49.847333908 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.451411963 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62366
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                          1192.168.2.44974534.107.221.82804828C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:50.584498882 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.194736004 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72686
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success


                                                                                                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                          2192.168.2.44975134.107.221.82804828C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:51.425405025 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.034060001 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62367
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.817970991 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.946863890 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62368
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.154222965 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.280718088 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62369
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.351603985 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.477897882 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62372
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.121897936 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.249440908 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62376
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.181216955 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.309583902 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62378
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.722250938 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.849353075 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62378
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:04.458249092 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:04.585712910 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62380
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:14.593420982 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.285978079 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.412704945 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62391
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.370898008 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.497935057 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62392
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.036727905 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.162708998 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62393
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:27.182815075 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.019833088 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.148777962 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62412
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:41.111885071 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:41.238481998 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62417
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.672213078 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.799622059 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62422
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:56.810308933 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:06.819905996 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.832967043 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:16.889604092 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:17.017625093 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62452
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:27.030709028 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:37.043943882 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:47.050951958 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:57.064014912 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:07.076771975 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.068862915 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.195955992 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62534
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                          3192.168.2.44975534.107.221.82804828C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.669493914 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache


                                                                                                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                                                                                                                                                          4192.168.2.44975634.107.221.82804828C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:52.996712923 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:53.624560118 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72688
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.339437008 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.471306086 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72691
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.646341085 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:40:56.779110909 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72691
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.430464029 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:00.563781023 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72695
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.430880070 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:02.562299013 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72697
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:04.293217897 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:04.425836086 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72699
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.664231062 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:05.796506882 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72700
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.420567989 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:15.552395105 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72710
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.506880999 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:16.639020920 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72711
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.165553093 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:17.296854019 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72712
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:27.314373970 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.151721954 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:36.283536911 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72731
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:41.241311073 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:41.372174978 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72736
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.821368933 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:46.962837934 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72741
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success
                                                                                                                                                                                                                                          Nov 1, 2024 12:41:56.976327896 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:06.989387989 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:17.002389908 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:17.021460056 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:17.154304028 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72772
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:27.162394047 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:37.175472975 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:47.189126968 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:42:57.202064037 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:07.208312988 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:17.220741987 CET6OUTData Raw: 00
                                                                                                                                                                                                                                          Data Ascii:
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.200334072 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:38.330923080 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72853
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success


                                                                                                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                                                                                                                                          5192.168.2.45006334.107.221.8280
                                                                                                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:47.573786974 CET303OUTGET /canonical.html HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.177473068 CET298INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 90
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 18:21:24 GMT
                                                                                                                                                                                                                                          Age: 62544
                                                                                                                                                                                                                                          Content-Type: text/html
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 3c 6d 65 74 61 20 68 74 74 70 2d 65 71 75 69 76 3d 22 72 65 66 72 65 73 68 22 20 63 6f 6e 74 65 6e 74 3d 22 30 3b 75 72 6c 3d 68 74 74 70 73 3a 2f 2f 73 75 70 70 6f 72 74 2e 6d 6f 7a 69 6c 6c 61 2e 6f 72 67 2f 6b 62 2f 63 61 70 74 69 76 65 2d 70 6f 72 74 61 6c 22 2f 3e
                                                                                                                                                                                                                                          Data Ascii: <meta http-equiv="refresh" content="0;url=https://support.mozilla.org/kb/captive-portal"/>


                                                                                                                                                                                                                                          Session IDSource IPSource PortDestination IPDestination Port
                                                                                                                                                                                                                                          6192.168.2.45006434.107.221.8280
                                                                                                                                                                                                                                          TimestampBytes transferredDirectionData
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.185867071 CET305OUTGET /success.txt?ipv4 HTTP/1.1
                                                                                                                                                                                                                                          Host: detectportal.firefox.com
                                                                                                                                                                                                                                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:109.0) Gecko/20100101 Firefox/118.0
                                                                                                                                                                                                                                          Accept: */*
                                                                                                                                                                                                                                          Accept-Language: en-US,en;q=0.5
                                                                                                                                                                                                                                          Accept-Encoding: gzip, deflate
                                                                                                                                                                                                                                          Connection: keep-alive
                                                                                                                                                                                                                                          Pragma: no-cache
                                                                                                                                                                                                                                          Cache-Control: no-cache
                                                                                                                                                                                                                                          Nov 1, 2024 12:43:48.784909010 CET216INHTTP/1.1 200 OK
                                                                                                                                                                                                                                          Server: nginx
                                                                                                                                                                                                                                          Content-Length: 8
                                                                                                                                                                                                                                          Via: 1.1 google
                                                                                                                                                                                                                                          Date: Thu, 31 Oct 2024 15:29:25 GMT
                                                                                                                                                                                                                                          Age: 72863
                                                                                                                                                                                                                                          Content-Type: text/plain
                                                                                                                                                                                                                                          Cache-Control: public,must-revalidate,max-age=0,s-maxage=3600
                                                                                                                                                                                                                                          Data Raw: 73 75 63 63 65 73 73 0a
                                                                                                                                                                                                                                          Data Ascii: success


                                                                                                                                                                                                                                          Click to jump to process

                                                                                                                                                                                                                                          Click to jump to process

                                                                                                                                                                                                                                          Click to dive into process behavior distribution

                                                                                                                                                                                                                                          Click to jump to process

                                                                                                                                                                                                                                          Target ID:0
                                                                                                                                                                                                                                          Start time:07:40:40
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                                                                          Commandline:"C:\Users\user\Desktop\file.exe"
                                                                                                                                                                                                                                          Imagebase:0xe40000
                                                                                                                                                                                                                                          File size:919'552 bytes
                                                                                                                                                                                                                                          MD5 hash:CEAC3C3FB770FCEB89DE4981F995C333
                                                                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Yara matches:
                                                                                                                                                                                                                                          • Rule: JoeSecurity_CredentialFlusher, Description: Yara detected Credential Flusher, Source: 00000000.00000003.1700677570.0000000001031000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                                                                                                                                                                                          Reputation:low
                                                                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                                                                          Target ID:1
                                                                                                                                                                                                                                          Start time:07:40:40
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                                                                          Commandline:taskkill /F /IM firefox.exe /T
                                                                                                                                                                                                                                          Imagebase:0xc30000
                                                                                                                                                                                                                                          File size:74'240 bytes
                                                                                                                                                                                                                                          MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Reputation:high
                                                                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                                                                          Target ID:2
                                                                                                                                                                                                                                          Start time:07:40:40
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                          Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                          File size:862'208 bytes
                                                                                                                                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Reputation:high
                                                                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                                                                          Target ID:3
                                                                                                                                                                                                                                          Start time:07:40:42
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                                                                          Commandline:taskkill /F /IM chrome.exe /T
                                                                                                                                                                                                                                          Imagebase:0xc30000
                                                                                                                                                                                                                                          File size:74'240 bytes
                                                                                                                                                                                                                                          MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Reputation:high
                                                                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                                                                          Target ID:4
                                                                                                                                                                                                                                          Start time:07:40:43
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                          Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                          File size:862'208 bytes
                                                                                                                                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Reputation:high
                                                                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                                                                          Target ID:5
                                                                                                                                                                                                                                          Start time:07:40:43
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                                                                          Commandline:taskkill /F /IM msedge.exe /T
                                                                                                                                                                                                                                          Imagebase:0xc30000
                                                                                                                                                                                                                                          File size:74'240 bytes
                                                                                                                                                                                                                                          MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Reputation:high
                                                                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                                                                          Target ID:6
                                                                                                                                                                                                                                          Start time:07:40:43
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                          Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                          File size:862'208 bytes
                                                                                                                                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Reputation:high
                                                                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                                                                          Target ID:7
                                                                                                                                                                                                                                          Start time:07:40:43
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                                                                          Commandline:taskkill /F /IM opera.exe /T
                                                                                                                                                                                                                                          Imagebase:0xc30000
                                                                                                                                                                                                                                          File size:74'240 bytes
                                                                                                                                                                                                                                          MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Reputation:high
                                                                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                                                                          Target ID:8
                                                                                                                                                                                                                                          Start time:07:40:43
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                          Imagebase:0xb0000
                                                                                                                                                                                                                                          File size:862'208 bytes
                                                                                                                                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Reputation:high
                                                                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                                                                          Target ID:9
                                                                                                                                                                                                                                          Start time:07:40:43
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Windows\SysWOW64\taskkill.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):true
                                                                                                                                                                                                                                          Commandline:taskkill /F /IM brave.exe /T
                                                                                                                                                                                                                                          Imagebase:0xc30000
                                                                                                                                                                                                                                          File size:74'240 bytes
                                                                                                                                                                                                                                          MD5 hash:CA313FD7E6C2A778FFD21CFB5C1C56CD
                                                                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Reputation:high
                                                                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                                                                          Target ID:10
                                                                                                                                                                                                                                          Start time:07:40:43
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Windows\System32\conhost.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                                                                                                                                                          Imagebase:0x7ff7699e0000
                                                                                                                                                                                                                                          File size:862'208 bytes
                                                                                                                                                                                                                                          MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Reputation:high
                                                                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                                                                          Target ID:11
                                                                                                                                                                                                                                          Start time:07:40:43
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                                                                          Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk "https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd" --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                          Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                          File size:676'768 bytes
                                                                                                                                                                                                                                          MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                          Has elevated privileges:true
                                                                                                                                                                                                                                          Has administrator privileges:true
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                                                                          Target ID:12
                                                                                                                                                                                                                                          Start time:07:40:43
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                                                                          Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking --attempting-deelevation
                                                                                                                                                                                                                                          Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                          File size:676'768 bytes
                                                                                                                                                                                                                                          MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                          Has elevated privileges:false
                                                                                                                                                                                                                                          Has administrator privileges:false
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Has exited:true

                                                                                                                                                                                                                                          Target ID:13
                                                                                                                                                                                                                                          Start time:07:40:43
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                                                                          Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" --kiosk https://youtube.com/account?=https://accounts.google.com/v3/signin/challenge/pwd --no-default-browser-check --disable-popup-blocking
                                                                                                                                                                                                                                          Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                          File size:676'768 bytes
                                                                                                                                                                                                                                          MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                          Has elevated privileges:false
                                                                                                                                                                                                                                          Has administrator privileges:false
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Has exited:false

                                                                                                                                                                                                                                          Target ID:15
                                                                                                                                                                                                                                          Start time:07:40:44
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                                                                          Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=2308 -parentBuildID 20230927232528 -prefsHandle 2244 -prefMapHandle 2236 -prefsLen 25359 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {b782c814-8c81-47ba-94c2-df392bb2665e} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" 1b26d96f710 socket
                                                                                                                                                                                                                                          Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                          File size:676'768 bytes
                                                                                                                                                                                                                                          MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                          Has elevated privileges:false
                                                                                                                                                                                                                                          Has administrator privileges:false
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Has exited:false

                                                                                                                                                                                                                                          Target ID:16
                                                                                                                                                                                                                                          Start time:07:40:47
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                                                                          Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=4104 -parentBuildID 20230927232528 -prefsHandle 3944 -prefMapHandle 3996 -prefsLen 26374 -prefMapSize 237879 -appDir "C:\Program Files\Mozilla Firefox\browser" - {a411c8dc-255d-4563-a475-6fb43a43af83} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" 1b26d97b610 rdd
                                                                                                                                                                                                                                          Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                          File size:676'768 bytes
                                                                                                                                                                                                                                          MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                          Has elevated privileges:false
                                                                                                                                                                                                                                          Has administrator privileges:false
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Has exited:false

                                                                                                                                                                                                                                          Target ID:17
                                                                                                                                                                                                                                          Start time:07:40:55
                                                                                                                                                                                                                                          Start date:01/11/2024
                                                                                                                                                                                                                                          Path:C:\Program Files\Mozilla Firefox\firefox.exe
                                                                                                                                                                                                                                          Wow64 process (32bit):false
                                                                                                                                                                                                                                          Commandline:"C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel=5016 -parentBuildID 20230927232528 -sandboxingKind 0 -prefsHandle 3760 -prefMapHandle 3756 -prefsLen 33185 -prefMapSize 237879 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {cd112c45-1629-47bd-a8be-e043aeb3b23d} 4828 "\\.\pipe\gecko-crash-server-pipe.4828" 1b285591d10 utility
                                                                                                                                                                                                                                          Imagebase:0x7ff6bf500000
                                                                                                                                                                                                                                          File size:676'768 bytes
                                                                                                                                                                                                                                          MD5 hash:C86B1BE9ED6496FE0E0CBE73F81D8045
                                                                                                                                                                                                                                          Has elevated privileges:false
                                                                                                                                                                                                                                          Has administrator privileges:false
                                                                                                                                                                                                                                          Programmed in:C, C++ or other language
                                                                                                                                                                                                                                          Has exited:false

                                                                                                                                                                                                                                          Reset < >

                                                                                                                                                                                                                                            Execution Graph

                                                                                                                                                                                                                                            Execution Coverage:2.1%
                                                                                                                                                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                            Signature Coverage:4.3%
                                                                                                                                                                                                                                            Total number of Nodes:1576
                                                                                                                                                                                                                                            Total number of Limit Nodes:53
                                                                                                                                                                                                                                            execution_graph 92099 e41044 92104 e410f3 92099->92104 92101 e4104a 92140 e600a3 29 API calls __onexit 92101->92140 92103 e41054 92141 e41398 92104->92141 92108 e4116a 92151 e4a961 92108->92151 92111 e4a961 22 API calls 92112 e4117e 92111->92112 92113 e4a961 22 API calls 92112->92113 92114 e41188 92113->92114 92115 e4a961 22 API calls 92114->92115 92116 e411c6 92115->92116 92117 e4a961 22 API calls 92116->92117 92118 e41292 92117->92118 92156 e4171c 92118->92156 92122 e412c4 92123 e4a961 22 API calls 92122->92123 92124 e412ce 92123->92124 92177 e51940 92124->92177 92126 e412f9 92187 e41aab 92126->92187 92128 e41315 92129 e41325 GetStdHandle 92128->92129 92130 e82485 92129->92130 92131 e4137a 92129->92131 92130->92131 92132 e8248e 92130->92132 92135 e41387 OleInitialize 92131->92135 92194 e5fddb 92132->92194 92134 e82495 92204 eb011d InitializeCriticalSectionAndSpinCount InterlockedExchange GetCurrentProcess GetCurrentProcess DuplicateHandle 92134->92204 92135->92101 92137 e8249e 92205 eb0944 CreateThread 92137->92205 92139 e824aa CloseHandle 92139->92131 92140->92103 92206 e413f1 92141->92206 92144 e413f1 22 API calls 92145 e413d0 92144->92145 92146 e4a961 22 API calls 92145->92146 92147 e413dc 92146->92147 92213 e46b57 92147->92213 92149 e41129 92150 e41bc3 6 API calls 92149->92150 92150->92108 92152 e5fe0b 22 API calls 92151->92152 92153 e4a976 92152->92153 92154 e5fddb 22 API calls 92153->92154 92155 e41174 92154->92155 92155->92111 92157 e4a961 22 API calls 92156->92157 92158 e4172c 92157->92158 92159 e4a961 22 API calls 92158->92159 92160 e41734 92159->92160 92161 e4a961 22 API calls 92160->92161 92162 e4174f 92161->92162 92163 e5fddb 22 API calls 92162->92163 92164 e4129c 92163->92164 92165 e41b4a 92164->92165 92166 e41b58 92165->92166 92167 e4a961 22 API calls 92166->92167 92168 e41b63 92167->92168 92169 e4a961 22 API calls 92168->92169 92170 e41b6e 92169->92170 92171 e4a961 22 API calls 92170->92171 92172 e41b79 92171->92172 92173 e4a961 22 API calls 92172->92173 92174 e41b84 92173->92174 92175 e5fddb 22 API calls 92174->92175 92176 e41b96 RegisterWindowMessageW 92175->92176 92176->92122 92178 e51981 92177->92178 92181 e5195d 92177->92181 92258 e60242 5 API calls __Init_thread_wait 92178->92258 92186 e5196e 92181->92186 92260 e60242 5 API calls __Init_thread_wait 92181->92260 92182 e5198b 92182->92181 92259 e601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 92182->92259 92183 e58727 92183->92186 92261 e601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 92183->92261 92186->92126 92188 e8272d 92187->92188 92189 e41abb 92187->92189 92262 eb3209 23 API calls 92188->92262 92191 e5fddb 22 API calls 92189->92191 92192 e41ac3 92191->92192 92192->92128 92193 e82738 92196 e5fde0 92194->92196 92195 e6ea0c ___std_exception_copy 21 API calls 92195->92196 92196->92195 92197 e5fdfa 92196->92197 92200 e5fdfc 92196->92200 92263 e64ead 7 API calls 2 library calls 92196->92263 92197->92134 92199 e6066d 92265 e632a4 RaiseException 92199->92265 92200->92199 92264 e632a4 RaiseException 92200->92264 92203 e6068a 92203->92134 92204->92137 92205->92139 92266 eb092a 28 API calls 92205->92266 92207 e4a961 22 API calls 92206->92207 92208 e413fc 92207->92208 92209 e4a961 22 API calls 92208->92209 92210 e41404 92209->92210 92211 e4a961 22 API calls 92210->92211 92212 e413c6 92211->92212 92212->92144 92214 e46b67 _wcslen 92213->92214 92215 e84ba1 92213->92215 92218 e46ba2 92214->92218 92219 e46b7d 92214->92219 92236 e493b2 92215->92236 92217 e84baa 92217->92217 92220 e5fddb 22 API calls 92218->92220 92225 e46f34 22 API calls 92219->92225 92223 e46bae 92220->92223 92222 e46b85 __fread_nolock 92222->92149 92226 e5fe0b 92223->92226 92225->92222 92228 e5fddb 92226->92228 92229 e5fdfa 92228->92229 92231 e5fdfc 92228->92231 92240 e6ea0c 92228->92240 92247 e64ead 7 API calls 2 library calls 92228->92247 92229->92222 92235 e6066d 92231->92235 92248 e632a4 RaiseException 92231->92248 92234 e6068a 92234->92222 92249 e632a4 RaiseException 92235->92249 92237 e493c0 92236->92237 92239 e493c9 __fread_nolock 92236->92239 92237->92239 92252 e4aec9 92237->92252 92239->92217 92245 e73820 __FrameHandler3::FrameUnwindToState 92240->92245 92241 e7385e 92251 e6f2d9 20 API calls __dosmaperr 92241->92251 92242 e73849 RtlAllocateHeap 92244 e7385c 92242->92244 92242->92245 92244->92228 92245->92241 92245->92242 92250 e64ead 7 API calls 2 library calls 92245->92250 92247->92228 92248->92235 92249->92234 92250->92245 92251->92244 92253 e4aedc 92252->92253 92257 e4aed9 __fread_nolock 92252->92257 92254 e5fddb 22 API calls 92253->92254 92255 e4aee7 92254->92255 92256 e5fe0b 22 API calls 92255->92256 92256->92257 92257->92239 92258->92182 92259->92181 92260->92183 92261->92186 92262->92193 92263->92196 92264->92199 92265->92203 92267 e78402 92272 e781be 92267->92272 92270 e7842a 92273 e781ef try_get_first_available_module 92272->92273 92280 e78338 92273->92280 92287 e68e0b 40 API calls 2 library calls 92273->92287 92275 e783ee 92291 e727ec 26 API calls __fread_nolock 92275->92291 92277 e78343 92277->92270 92284 e80984 92277->92284 92279 e7838c 92279->92280 92288 e68e0b 40 API calls 2 library calls 92279->92288 92280->92277 92290 e6f2d9 20 API calls __dosmaperr 92280->92290 92282 e783ab 92282->92280 92289 e68e0b 40 API calls 2 library calls 92282->92289 92292 e80081 92284->92292 92286 e8099f 92286->92270 92287->92279 92288->92282 92289->92280 92290->92275 92291->92277 92294 e8008d ___scrt_is_nonwritable_in_current_image 92292->92294 92293 e8009b 92349 e6f2d9 20 API calls __dosmaperr 92293->92349 92294->92293 92296 e800d4 92294->92296 92303 e8065b 92296->92303 92297 e800a0 92350 e727ec 26 API calls __fread_nolock 92297->92350 92302 e800aa __fread_nolock 92302->92286 92304 e80678 92303->92304 92305 e8068d 92304->92305 92306 e806a6 92304->92306 92366 e6f2c6 20 API calls __dosmaperr 92305->92366 92352 e75221 92306->92352 92309 e806ab 92310 e806cb 92309->92310 92311 e806b4 92309->92311 92365 e8039a CreateFileW 92310->92365 92368 e6f2c6 20 API calls __dosmaperr 92311->92368 92315 e806b9 92369 e6f2d9 20 API calls __dosmaperr 92315->92369 92316 e80781 GetFileType 92319 e8078c GetLastError 92316->92319 92323 e807d3 92316->92323 92318 e80756 GetLastError 92371 e6f2a3 20 API calls 2 library calls 92318->92371 92372 e6f2a3 20 API calls 2 library calls 92319->92372 92320 e80704 92320->92316 92320->92318 92370 e8039a CreateFileW 92320->92370 92374 e7516a 21 API calls 3 library calls 92323->92374 92325 e80692 92367 e6f2d9 20 API calls __dosmaperr 92325->92367 92326 e8079a CloseHandle 92326->92325 92327 e807c3 92326->92327 92373 e6f2d9 20 API calls __dosmaperr 92327->92373 92329 e80749 92329->92316 92329->92318 92331 e807f4 92333 e80840 92331->92333 92375 e805ab 72 API calls 4 library calls 92331->92375 92332 e807c8 92332->92325 92337 e8086d 92333->92337 92376 e8014d 72 API calls 4 library calls 92333->92376 92336 e80866 92336->92337 92338 e8087e 92336->92338 92377 e786ae 92337->92377 92340 e800f8 92338->92340 92341 e808fc CloseHandle 92338->92341 92351 e80121 LeaveCriticalSection __wsopen_s 92340->92351 92392 e8039a CreateFileW 92341->92392 92343 e80927 92344 e80931 GetLastError 92343->92344 92345 e8095d 92343->92345 92393 e6f2a3 20 API calls 2 library calls 92344->92393 92345->92340 92347 e8093d 92394 e75333 21 API calls 3 library calls 92347->92394 92349->92297 92350->92302 92351->92302 92353 e7522d ___scrt_is_nonwritable_in_current_image 92352->92353 92395 e72f5e EnterCriticalSection 92353->92395 92355 e7527b 92396 e7532a 92355->92396 92357 e75234 92357->92355 92358 e75259 92357->92358 92362 e752c7 EnterCriticalSection 92357->92362 92399 e75000 92358->92399 92359 e752a4 __fread_nolock 92359->92309 92362->92355 92363 e752d4 LeaveCriticalSection 92362->92363 92363->92357 92365->92320 92366->92325 92367->92340 92368->92315 92369->92325 92370->92329 92371->92325 92372->92326 92373->92332 92374->92331 92375->92333 92376->92336 92425 e753c4 92377->92425 92379 e786be 92380 e786c4 92379->92380 92382 e786f6 92379->92382 92384 e753c4 __wsopen_s 26 API calls 92379->92384 92438 e75333 21 API calls 3 library calls 92380->92438 92382->92380 92385 e753c4 __wsopen_s 26 API calls 92382->92385 92383 e7871c 92386 e7873e 92383->92386 92439 e6f2a3 20 API calls 2 library calls 92383->92439 92387 e786ed 92384->92387 92388 e78702 CloseHandle 92385->92388 92386->92340 92390 e753c4 __wsopen_s 26 API calls 92387->92390 92388->92380 92391 e7870e GetLastError 92388->92391 92390->92382 92391->92380 92392->92343 92393->92347 92394->92345 92395->92357 92407 e72fa6 LeaveCriticalSection 92396->92407 92398 e75331 92398->92359 92408 e74c7d 92399->92408 92401 e7501f 92416 e729c8 92401->92416 92402 e75012 92402->92401 92415 e73405 11 API calls 2 library calls 92402->92415 92405 e75071 92405->92355 92406 e75147 EnterCriticalSection 92405->92406 92406->92355 92407->92398 92414 e74c8a __FrameHandler3::FrameUnwindToState 92408->92414 92409 e74cca 92423 e6f2d9 20 API calls __dosmaperr 92409->92423 92410 e74cb5 RtlAllocateHeap 92412 e74cc8 92410->92412 92410->92414 92412->92402 92414->92409 92414->92410 92422 e64ead 7 API calls 2 library calls 92414->92422 92415->92402 92417 e729d3 RtlFreeHeap 92416->92417 92421 e729fc _free 92416->92421 92418 e729e8 92417->92418 92417->92421 92424 e6f2d9 20 API calls __dosmaperr 92418->92424 92420 e729ee GetLastError 92420->92421 92421->92405 92422->92414 92423->92412 92424->92420 92426 e753d1 92425->92426 92427 e753e6 92425->92427 92440 e6f2c6 20 API calls __dosmaperr 92426->92440 92431 e7540b 92427->92431 92442 e6f2c6 20 API calls __dosmaperr 92427->92442 92430 e753d6 92441 e6f2d9 20 API calls __dosmaperr 92430->92441 92431->92379 92432 e75416 92443 e6f2d9 20 API calls __dosmaperr 92432->92443 92435 e753de 92435->92379 92436 e7541e 92444 e727ec 26 API calls __fread_nolock 92436->92444 92438->92383 92439->92386 92440->92430 92441->92435 92442->92432 92443->92436 92444->92435 92445 e42de3 92446 e42df0 __wsopen_s 92445->92446 92447 e82c2b ___scrt_fastfail 92446->92447 92448 e42e09 92446->92448 92450 e82c47 GetOpenFileNameW 92447->92450 92461 e43aa2 92448->92461 92452 e82c96 92450->92452 92454 e46b57 22 API calls 92452->92454 92456 e82cab 92454->92456 92456->92456 92458 e42e27 92489 e444a8 92458->92489 92518 e81f50 92461->92518 92464 e43ace 92467 e46b57 22 API calls 92464->92467 92465 e43ae9 92524 e4a6c3 92465->92524 92468 e43ada 92467->92468 92520 e437a0 92468->92520 92471 e42da5 92472 e81f50 __wsopen_s 92471->92472 92473 e42db2 GetLongPathNameW 92472->92473 92474 e46b57 22 API calls 92473->92474 92475 e42dda 92474->92475 92476 e43598 92475->92476 92477 e4a961 22 API calls 92476->92477 92478 e435aa 92477->92478 92479 e43aa2 23 API calls 92478->92479 92480 e435b5 92479->92480 92481 e435c0 92480->92481 92484 e832eb 92480->92484 92530 e4515f 92481->92530 92486 e8330d 92484->92486 92542 e5ce60 41 API calls 92484->92542 92488 e435df 92488->92458 92543 e44ecb 92489->92543 92492 e83833 92565 eb2cf9 92492->92565 92494 e44ecb 94 API calls 92496 e444e1 92494->92496 92495 e83848 92497 e83869 92495->92497 92498 e8384c 92495->92498 92496->92492 92499 e444e9 92496->92499 92503 e5fe0b 22 API calls 92497->92503 92592 e44f39 92498->92592 92500 e444f5 92499->92500 92501 e83854 92499->92501 92591 e4940c 136 API calls 2 library calls 92500->92591 92598 eada5a 82 API calls 92501->92598 92517 e838ae 92503->92517 92506 e42e31 92507 e83862 92507->92497 92508 e44f39 68 API calls 92511 e83a5f 92508->92511 92511->92508 92604 ea989b 82 API calls __wsopen_s 92511->92604 92514 e49cb3 22 API calls 92514->92517 92517->92511 92517->92514 92599 ea967e 22 API calls __fread_nolock 92517->92599 92600 ea95ad 42 API calls _wcslen 92517->92600 92601 eb0b5a 22 API calls 92517->92601 92602 e4a4a1 22 API calls __fread_nolock 92517->92602 92603 e43ff7 22 API calls 92517->92603 92519 e43aaf GetFullPathNameW 92518->92519 92519->92464 92519->92465 92521 e437ae 92520->92521 92522 e493b2 22 API calls 92521->92522 92523 e42e12 92522->92523 92523->92471 92525 e4a6d0 92524->92525 92526 e4a6dd 92524->92526 92525->92468 92527 e5fddb 22 API calls 92526->92527 92528 e4a6e7 92527->92528 92529 e5fe0b 22 API calls 92528->92529 92529->92525 92531 e4516e 92530->92531 92535 e4518f __fread_nolock 92530->92535 92533 e5fe0b 22 API calls 92531->92533 92532 e5fddb 22 API calls 92534 e435cc 92532->92534 92533->92535 92536 e435f3 92534->92536 92535->92532 92537 e43605 92536->92537 92541 e43624 __fread_nolock 92536->92541 92539 e5fe0b 22 API calls 92537->92539 92538 e5fddb 22 API calls 92540 e4363b 92538->92540 92539->92541 92540->92488 92541->92538 92542->92484 92605 e44e90 LoadLibraryA 92543->92605 92548 e44ef6 LoadLibraryExW 92613 e44e59 LoadLibraryA 92548->92613 92549 e83ccf 92551 e44f39 68 API calls 92549->92551 92553 e83cd6 92551->92553 92555 e44e59 3 API calls 92553->92555 92557 e83cde 92555->92557 92556 e44f20 92556->92557 92558 e44f2c 92556->92558 92635 e450f5 92557->92635 92559 e44f39 68 API calls 92558->92559 92562 e444cd 92559->92562 92562->92492 92562->92494 92564 e83d05 92566 eb2d15 92565->92566 92567 e4511f 64 API calls 92566->92567 92568 eb2d29 92567->92568 92769 eb2e66 92568->92769 92571 eb2d3f 92571->92495 92572 e450f5 40 API calls 92573 eb2d56 92572->92573 92574 e450f5 40 API calls 92573->92574 92575 eb2d66 92574->92575 92576 e450f5 40 API calls 92575->92576 92577 eb2d81 92576->92577 92578 e450f5 40 API calls 92577->92578 92579 eb2d9c 92578->92579 92580 e4511f 64 API calls 92579->92580 92581 eb2db3 92580->92581 92582 e6ea0c ___std_exception_copy 21 API calls 92581->92582 92583 eb2dba 92582->92583 92584 e6ea0c ___std_exception_copy 21 API calls 92583->92584 92585 eb2dc4 92584->92585 92586 e450f5 40 API calls 92585->92586 92587 eb2dd8 92586->92587 92588 eb28fe 27 API calls 92587->92588 92589 eb2dee 92588->92589 92589->92571 92775 eb22ce 79 API calls 92589->92775 92591->92506 92593 e44f43 92592->92593 92595 e44f4a 92592->92595 92776 e6e678 92593->92776 92596 e44f59 92595->92596 92597 e44f6a FreeLibrary 92595->92597 92596->92501 92597->92596 92598->92507 92599->92517 92600->92517 92601->92517 92602->92517 92603->92517 92604->92511 92606 e44ec6 92605->92606 92607 e44ea8 GetProcAddress 92605->92607 92610 e6e5eb 92606->92610 92608 e44eb8 92607->92608 92608->92606 92609 e44ebf FreeLibrary 92608->92609 92609->92606 92643 e6e52a 92610->92643 92612 e44eea 92612->92548 92612->92549 92614 e44e8d 92613->92614 92615 e44e6e GetProcAddress 92613->92615 92618 e44f80 92614->92618 92616 e44e7e 92615->92616 92616->92614 92617 e44e86 FreeLibrary 92616->92617 92617->92614 92619 e5fe0b 22 API calls 92618->92619 92620 e44f95 92619->92620 92695 e45722 92620->92695 92622 e44fa1 __fread_nolock 92623 e450a5 92622->92623 92624 e83d1d 92622->92624 92629 e44fdc 92622->92629 92698 e442a2 CreateStreamOnHGlobal 92623->92698 92709 eb304d 74 API calls 92624->92709 92627 e83d22 92630 e4511f 64 API calls 92627->92630 92628 e450f5 40 API calls 92628->92629 92629->92627 92629->92628 92634 e4506e messages 92629->92634 92704 e4511f 92629->92704 92631 e83d45 92630->92631 92632 e450f5 40 API calls 92631->92632 92632->92634 92634->92556 92636 e45107 92635->92636 92637 e83d70 92635->92637 92731 e6e8c4 92636->92731 92640 eb28fe 92752 eb274e 92640->92752 92642 eb2919 92642->92564 92646 e6e536 ___scrt_is_nonwritable_in_current_image 92643->92646 92644 e6e544 92668 e6f2d9 20 API calls __dosmaperr 92644->92668 92646->92644 92648 e6e574 92646->92648 92647 e6e549 92669 e727ec 26 API calls __fread_nolock 92647->92669 92650 e6e586 92648->92650 92651 e6e579 92648->92651 92660 e78061 92650->92660 92670 e6f2d9 20 API calls __dosmaperr 92651->92670 92654 e6e58f 92655 e6e595 92654->92655 92656 e6e5a2 92654->92656 92671 e6f2d9 20 API calls __dosmaperr 92655->92671 92672 e6e5d4 LeaveCriticalSection __fread_nolock 92656->92672 92658 e6e554 __fread_nolock 92658->92612 92661 e7806d ___scrt_is_nonwritable_in_current_image 92660->92661 92673 e72f5e EnterCriticalSection 92661->92673 92663 e7807b 92674 e780fb 92663->92674 92667 e780ac __fread_nolock 92667->92654 92668->92647 92669->92658 92670->92658 92671->92658 92672->92658 92673->92663 92675 e7811e 92674->92675 92676 e78177 92675->92676 92683 e78088 92675->92683 92690 e6918d EnterCriticalSection 92675->92690 92691 e691a1 LeaveCriticalSection 92675->92691 92677 e74c7d __FrameHandler3::FrameUnwindToState 20 API calls 92676->92677 92678 e78180 92677->92678 92680 e729c8 _free 20 API calls 92678->92680 92681 e78189 92680->92681 92681->92683 92692 e73405 11 API calls 2 library calls 92681->92692 92687 e780b7 92683->92687 92684 e781a8 92693 e6918d EnterCriticalSection 92684->92693 92694 e72fa6 LeaveCriticalSection 92687->92694 92689 e780be 92689->92667 92690->92675 92691->92675 92692->92684 92693->92683 92694->92689 92696 e5fddb 22 API calls 92695->92696 92697 e45734 92696->92697 92697->92622 92699 e442bc FindResourceExW 92698->92699 92703 e442d9 92698->92703 92700 e835ba LoadResource 92699->92700 92699->92703 92701 e835cf SizeofResource 92700->92701 92700->92703 92702 e835e3 LockResource 92701->92702 92701->92703 92702->92703 92703->92629 92705 e83d90 92704->92705 92706 e4512e 92704->92706 92710 e6ece3 92706->92710 92709->92627 92713 e6eaaa 92710->92713 92712 e4513c 92712->92629 92716 e6eab6 ___scrt_is_nonwritable_in_current_image 92713->92716 92714 e6eac2 92726 e6f2d9 20 API calls __dosmaperr 92714->92726 92716->92714 92717 e6eae8 92716->92717 92728 e6918d EnterCriticalSection 92717->92728 92718 e6eac7 92727 e727ec 26 API calls __fread_nolock 92718->92727 92721 e6eaf4 92729 e6ec0a 62 API calls 2 library calls 92721->92729 92723 e6eb08 92730 e6eb27 LeaveCriticalSection __fread_nolock 92723->92730 92725 e6ead2 __fread_nolock 92725->92712 92726->92718 92727->92725 92728->92721 92729->92723 92730->92725 92734 e6e8e1 92731->92734 92733 e45118 92733->92640 92735 e6e8ed ___scrt_is_nonwritable_in_current_image 92734->92735 92736 e6e900 ___scrt_fastfail 92735->92736 92737 e6e92d 92735->92737 92738 e6e925 __fread_nolock 92735->92738 92747 e6f2d9 20 API calls __dosmaperr 92736->92747 92749 e6918d EnterCriticalSection 92737->92749 92738->92733 92741 e6e937 92750 e6e6f8 38 API calls 3 library calls 92741->92750 92742 e6e91a 92748 e727ec 26 API calls __fread_nolock 92742->92748 92745 e6e94e 92751 e6e96c LeaveCriticalSection __fread_nolock 92745->92751 92747->92742 92748->92738 92749->92741 92750->92745 92751->92738 92755 e6e4e8 92752->92755 92754 eb275d 92754->92642 92758 e6e469 92755->92758 92757 e6e505 92757->92754 92759 e6e48c 92758->92759 92760 e6e478 92758->92760 92765 e6e488 __alldvrm 92759->92765 92768 e7333f 11 API calls 2 library calls 92759->92768 92766 e6f2d9 20 API calls __dosmaperr 92760->92766 92762 e6e47d 92767 e727ec 26 API calls __fread_nolock 92762->92767 92765->92757 92766->92762 92767->92765 92768->92765 92770 eb2e7a 92769->92770 92771 eb2d3b 92770->92771 92772 e450f5 40 API calls 92770->92772 92773 eb28fe 27 API calls 92770->92773 92774 e4511f 64 API calls 92770->92774 92771->92571 92771->92572 92772->92770 92773->92770 92774->92770 92775->92571 92777 e6e684 ___scrt_is_nonwritable_in_current_image 92776->92777 92778 e6e695 92777->92778 92779 e6e6aa 92777->92779 92789 e6f2d9 20 API calls __dosmaperr 92778->92789 92788 e6e6a5 __fread_nolock 92779->92788 92791 e6918d EnterCriticalSection 92779->92791 92782 e6e69a 92790 e727ec 26 API calls __fread_nolock 92782->92790 92783 e6e6c6 92792 e6e602 92783->92792 92786 e6e6d1 92808 e6e6ee LeaveCriticalSection __fread_nolock 92786->92808 92788->92595 92789->92782 92790->92788 92791->92783 92793 e6e624 92792->92793 92794 e6e60f 92792->92794 92800 e6e61f 92793->92800 92811 e6dc0b 92793->92811 92809 e6f2d9 20 API calls __dosmaperr 92794->92809 92797 e6e614 92810 e727ec 26 API calls __fread_nolock 92797->92810 92800->92786 92804 e6e646 92828 e7862f 92804->92828 92807 e729c8 _free 20 API calls 92807->92800 92808->92788 92809->92797 92810->92800 92812 e6dc23 92811->92812 92813 e6dc1f 92811->92813 92812->92813 92814 e6d955 __fread_nolock 26 API calls 92812->92814 92817 e74d7a 92813->92817 92815 e6dc43 92814->92815 92843 e759be 62 API calls 5 library calls 92815->92843 92818 e74d90 92817->92818 92820 e6e640 92817->92820 92819 e729c8 _free 20 API calls 92818->92819 92818->92820 92819->92820 92821 e6d955 92820->92821 92822 e6d976 92821->92822 92823 e6d961 92821->92823 92822->92804 92844 e6f2d9 20 API calls __dosmaperr 92823->92844 92825 e6d966 92845 e727ec 26 API calls __fread_nolock 92825->92845 92827 e6d971 92827->92804 92829 e7863e 92828->92829 92833 e78653 92828->92833 92846 e6f2c6 20 API calls __dosmaperr 92829->92846 92831 e7868e 92851 e6f2c6 20 API calls __dosmaperr 92831->92851 92832 e78643 92847 e6f2d9 20 API calls __dosmaperr 92832->92847 92833->92831 92836 e7867a 92833->92836 92848 e78607 92836->92848 92837 e78693 92852 e6f2d9 20 API calls __dosmaperr 92837->92852 92840 e7869b 92853 e727ec 26 API calls __fread_nolock 92840->92853 92841 e6e64c 92841->92800 92841->92807 92843->92813 92844->92825 92845->92827 92846->92832 92847->92841 92854 e78585 92848->92854 92850 e7862b 92850->92841 92851->92837 92852->92840 92853->92841 92855 e78591 ___scrt_is_nonwritable_in_current_image 92854->92855 92865 e75147 EnterCriticalSection 92855->92865 92857 e7859f 92858 e785c6 92857->92858 92859 e785d1 92857->92859 92860 e786ae __wsopen_s 29 API calls 92858->92860 92866 e6f2d9 20 API calls __dosmaperr 92859->92866 92862 e785cc 92860->92862 92867 e785fb LeaveCriticalSection __wsopen_s 92862->92867 92864 e785ee __fread_nolock 92864->92850 92865->92857 92866->92862 92867->92864 92868 e41cad SystemParametersInfoW 92869 e82402 92872 e41410 92869->92872 92873 e824b8 DestroyWindow 92872->92873 92874 e4144f mciSendStringW 92872->92874 92884 e824c4 92873->92884 92875 e416c6 92874->92875 92876 e4146b 92874->92876 92875->92876 92878 e416d5 UnregisterHotKey 92875->92878 92877 e41479 92876->92877 92876->92884 92905 e4182e 92877->92905 92878->92875 92881 e824e2 FindClose 92881->92884 92883 e4148e 92886 e8252d 92883->92886 92894 e4149c 92883->92894 92884->92881 92885 e824d8 92884->92885 92888 e82509 92884->92888 92885->92884 92911 e46246 CloseHandle 92885->92911 92889 e82541 VirtualFree 92886->92889 92896 e41509 92886->92896 92887 e8251c FreeLibrary 92887->92888 92888->92886 92888->92887 92889->92886 92890 e414f8 CoUninitialize 92890->92896 92891 e41514 92893 e41524 92891->92893 92892 e82589 92898 e82598 messages 92892->92898 92912 eb32eb 6 API calls messages 92892->92912 92909 e41944 VirtualFreeEx CloseHandle 92893->92909 92894->92890 92896->92891 92896->92892 92901 e82627 92898->92901 92913 ea64d4 22 API calls messages 92898->92913 92900 e4153a 92900->92898 92902 e4161f 92900->92902 92901->92901 92902->92901 92910 e41876 CloseHandle InternetCloseHandle InternetCloseHandle WaitForSingleObject 92902->92910 92904 e416c1 92907 e4183b 92905->92907 92906 e41480 92906->92883 92906->92888 92907->92906 92914 ea702a 22 API calls 92907->92914 92909->92900 92910->92904 92911->92885 92912->92892 92913->92898 92914->92907 92915 e82ba5 92916 e42b25 92915->92916 92917 e82baf 92915->92917 92943 e42b83 7 API calls 92916->92943 92961 e43a5a 92917->92961 92921 e82bb8 92968 e49cb3 92921->92968 92924 e42b2f 92934 e42b44 92924->92934 92947 e43837 92924->92947 92925 e82bc6 92926 e82bce 92925->92926 92927 e82bf5 92925->92927 92974 e433c6 92926->92974 92928 e433c6 22 API calls 92927->92928 92941 e82bf1 GetForegroundWindow ShellExecuteW 92928->92941 92933 e42b5f 92938 e42b66 SetCurrentDirectoryW 92933->92938 92934->92933 92957 e430f2 92934->92957 92937 e82be7 92940 e433c6 22 API calls 92937->92940 92942 e42b7a 92938->92942 92939 e82c26 92939->92933 92940->92941 92941->92939 92984 e42cd4 7 API calls 92943->92984 92945 e42b2a 92946 e42c63 CreateWindowExW CreateWindowExW ShowWindow ShowWindow 92945->92946 92946->92924 92948 e43862 ___scrt_fastfail 92947->92948 92985 e44212 92948->92985 92952 e43906 Shell_NotifyIconW 92989 e43923 92952->92989 92953 e83386 Shell_NotifyIconW 92955 e4391c 92955->92934 92956 e438e8 92956->92952 92956->92953 92958 e43154 92957->92958 92959 e43104 ___scrt_fastfail 92957->92959 92958->92933 92960 e43123 Shell_NotifyIconW 92959->92960 92960->92958 92962 e81f50 __wsopen_s 92961->92962 92963 e43a67 GetModuleFileNameW 92962->92963 92964 e49cb3 22 API calls 92963->92964 92965 e43a8d 92964->92965 92966 e43aa2 23 API calls 92965->92966 92967 e43a97 92966->92967 92967->92921 92969 e49cc2 _wcslen 92968->92969 92970 e5fe0b 22 API calls 92969->92970 92971 e49cea __fread_nolock 92970->92971 92972 e5fddb 22 API calls 92971->92972 92973 e49d00 92972->92973 92973->92925 92975 e830bb 92974->92975 92976 e433dd 92974->92976 92978 e5fddb 22 API calls 92975->92978 93020 e433ee 92976->93020 92980 e830c5 _wcslen 92978->92980 92979 e433e8 92983 e46350 22 API calls 92979->92983 92981 e5fe0b 22 API calls 92980->92981 92982 e830fe __fread_nolock 92981->92982 92983->92937 92984->92945 92986 e438b7 92985->92986 92987 e835a4 92985->92987 92986->92956 93011 eac874 42 API calls _strftime 92986->93011 92987->92986 92988 e835ad DestroyIcon 92987->92988 92988->92986 92990 e4393f 92989->92990 93009 e43a13 92989->93009 93012 e46270 92990->93012 92993 e83393 LoadStringW 92996 e833ad 92993->92996 92994 e4395a 92995 e46b57 22 API calls 92994->92995 92997 e4396f 92995->92997 93005 e43994 ___scrt_fastfail 92996->93005 93018 e4a8c7 22 API calls __fread_nolock 92996->93018 92998 e833c9 92997->92998 92999 e4397c 92997->92999 93019 e46350 22 API calls 92998->93019 92999->92996 93001 e43986 92999->93001 93017 e46350 22 API calls 93001->93017 93004 e833d7 93004->93005 93007 e433c6 22 API calls 93004->93007 93006 e439f9 Shell_NotifyIconW 93005->93006 93006->93009 93008 e833f9 93007->93008 93010 e433c6 22 API calls 93008->93010 93009->92955 93010->93005 93011->92956 93013 e5fe0b 22 API calls 93012->93013 93014 e46295 93013->93014 93015 e5fddb 22 API calls 93014->93015 93016 e4394d 93015->93016 93016->92993 93016->92994 93017->93005 93018->93005 93019->93004 93021 e433fe _wcslen 93020->93021 93022 e8311d 93021->93022 93023 e43411 93021->93023 93025 e5fddb 22 API calls 93022->93025 93030 e4a587 93023->93030 93027 e83127 93025->93027 93026 e4341e __fread_nolock 93026->92979 93028 e5fe0b 22 API calls 93027->93028 93029 e83157 __fread_nolock 93028->93029 93031 e4a59d 93030->93031 93034 e4a598 __fread_nolock 93030->93034 93032 e5fe0b 22 API calls 93031->93032 93033 e8f80f 93031->93033 93032->93034 93034->93026 93035 e925fb 93216 eabe52 93035->93216 93037 e4dbaf Sleep 93041 e4dbc0 93037->93041 93051 e4dbcb 93037->93051 93039 e92605 93043 e92630 93039->93043 93044 eabe52 Sleep 93039->93044 93088 e4d815 messages 93039->93088 93226 e5e300 23 API calls 93039->93226 93040 e92b74 Sleep 93042 e92b85 93040->93042 93048 e92b90 93040->93048 93223 e5e551 timeGetTime 93041->93223 93258 e5e551 timeGetTime 93042->93258 93047 e49cb3 22 API calls 93043->93047 93044->93039 93050 e92660 93047->93050 93052 e92bdb 93048->93052 93081 e4d9b8 messages 93048->93081 93259 ead4dc CreateToolhelp32Snapshot Process32FirstW 93048->93259 93227 e4a993 41 API calls 93050->93227 93054 e92a5a 93051->93054 93055 e92a51 93051->93055 93065 e92a63 93051->93065 93051->93081 93056 e92c0b GetExitCodeProcess 93052->93056 93062 e92c51 93052->93062 93052->93081 93255 ed29bf GetForegroundWindow 93054->93255 93254 ed29bf GetForegroundWindow 93055->93254 93057 e92c21 WaitForSingleObject 93056->93057 93058 e92c37 CloseHandle 93056->93058 93057->93058 93057->93081 93058->93062 93060 e9267c 93228 eb3a2a 23 API calls 93060->93228 93064 e92ca9 Sleep 93062->93064 93064->93081 93066 e92b47 93065->93066 93067 e92a58 93065->93067 93065->93081 93257 eae97b QueryPerformanceCounter QueryPerformanceFrequency Sleep QueryPerformanceCounter Sleep 93066->93257 93067->93065 93067->93066 93256 ec5658 23 API calls 93067->93256 93071 e928ce 93229 e4ec40 93071->93229 93072 e92b6f 93072->93081 93077 e4dac8 93253 eb359c 82 API calls __wsopen_s 93077->93253 93079 e4db11 PeekMessageW 93079->93088 93080 e91cbe TranslateAcceleratorW 93080->93088 93083 e4db8f PeekMessageW 93083->93088 93084 e4db73 TranslateMessage DispatchMessageW 93084->93083 93085 e4da04 timeGetTime 93085->93088 93086 e91dda timeGetTime 93224 e5e300 23 API calls 93086->93224 93088->93037 93088->93040 93088->93071 93088->93077 93088->93079 93088->93080 93088->93081 93088->93083 93088->93084 93088->93085 93088->93086 93090 e4dd50 93088->93090 93097 e51310 93088->93097 93153 e4bf40 93088->93153 93211 e5edf6 93088->93211 93222 e4dfd0 348 API calls 3 library calls 93088->93222 93225 eb3a2a 23 API calls 93088->93225 93091 e4dd83 93090->93091 93092 e4dd6f 93090->93092 93301 eb359c 82 API calls __wsopen_s 93091->93301 93269 e4d260 93092->93269 93095 e4dd7a 93095->93088 93096 e92f75 93096->93096 93098 e51376 93097->93098 93099 e517b0 93097->93099 93100 e51390 93098->93100 93101 e96331 93098->93101 93340 e60242 5 API calls __Init_thread_wait 93099->93340 93103 e51940 9 API calls 93100->93103 93354 ec709c 348 API calls 93101->93354 93106 e513a0 93103->93106 93105 e517ba 93107 e517fb 93105->93107 93109 e49cb3 22 API calls 93105->93109 93108 e51940 9 API calls 93106->93108 93112 e5182c 93107->93112 93113 e9633d 93107->93113 93110 e513b6 93108->93110 93116 e517d4 93109->93116 93110->93107 93111 e513ec 93110->93111 93111->93113 93119 e51408 __fread_nolock 93111->93119 93342 e4aceb 93112->93342 93355 eb359c 82 API calls __wsopen_s 93113->93355 93341 e601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent 93116->93341 93117 e51839 93352 e5d217 348 API calls 93117->93352 93119->93117 93121 e9636e 93119->93121 93129 e5fddb 22 API calls 93119->93129 93130 e5fe0b 22 API calls 93119->93130 93135 e4ec40 348 API calls 93119->93135 93136 e5152f 93119->93136 93137 e963b2 93119->93137 93140 e96369 93119->93140 93356 eb359c 82 API calls __wsopen_s 93121->93356 93123 e51872 93353 e5faeb 23 API calls 93123->93353 93124 e963d1 93358 ec5745 54 API calls _wcslen 93124->93358 93125 e5153c 93127 e51940 9 API calls 93125->93127 93128 e51549 93127->93128 93132 e51940 9 API calls 93128->93132 93133 e964fa 93128->93133 93129->93119 93130->93119 93139 e51563 93132->93139 93133->93140 93360 eb359c 82 API calls __wsopen_s 93133->93360 93135->93119 93136->93124 93136->93125 93357 eb359c 82 API calls __wsopen_s 93137->93357 93139->93133 93143 e515c7 messages 93139->93143 93359 e4a8c7 22 API calls __fread_nolock 93139->93359 93140->93088 93142 e51940 9 API calls 93142->93143 93143->93123 93143->93133 93143->93140 93143->93142 93146 e5167b messages 93143->93146 93311 eb5c5a 93143->93311 93316 ecab67 93143->93316 93319 ecabf7 93143->93319 93324 eca2ea 93143->93324 93329 ed1591 93143->93329 93332 e5f645 93143->93332 93144 e5171d 93144->93088 93146->93144 93339 e5ce17 22 API calls messages 93146->93339 93534 e4adf0 93153->93534 93155 e4bf9d 93156 e4bfa9 93155->93156 93157 e904b6 93155->93157 93159 e904c6 93156->93159 93160 e4c01e 93156->93160 93552 eb359c 82 API calls __wsopen_s 93157->93552 93553 eb359c 82 API calls __wsopen_s 93159->93553 93539 e4ac91 93160->93539 93163 ea7120 22 API calls 93208 e4c039 __fread_nolock messages 93163->93208 93164 e4c7da 93169 e5fe0b 22 API calls 93164->93169 93166 e5fddb 22 API calls 93166->93208 93174 e4c808 __fread_nolock 93169->93174 93171 e904f5 93175 e9055a 93171->93175 93554 e5d217 348 API calls 93171->93554 93179 e5fe0b 22 API calls 93174->93179 93196 e4c603 93175->93196 93555 eb359c 82 API calls __wsopen_s 93175->93555 93176 e4ec40 348 API calls 93176->93208 93177 e4af8a 22 API calls 93177->93208 93178 e9091a 93564 eb3209 23 API calls 93178->93564 93200 e4c350 __fread_nolock messages 93179->93200 93182 e908a5 93183 e4ec40 348 API calls 93182->93183 93185 e908cf 93183->93185 93185->93196 93562 e4a81b 41 API calls 93185->93562 93186 e90591 93556 eb359c 82 API calls __wsopen_s 93186->93556 93189 e908f6 93563 eb359c 82 API calls __wsopen_s 93189->93563 93192 e4aceb 23 API calls 93192->93208 93193 e4c237 93194 e4c253 93193->93194 93565 e4a8c7 22 API calls __fread_nolock 93193->93565 93197 e90976 93194->93197 93202 e4c297 messages 93194->93202 93196->93088 93199 e4aceb 23 API calls 93197->93199 93201 e909bf 93199->93201 93210 e4c3ac 93200->93210 93551 e5ce17 22 API calls messages 93200->93551 93201->93196 93566 eb359c 82 API calls __wsopen_s 93201->93566 93202->93201 93203 e4aceb 23 API calls 93202->93203 93204 e4c335 93203->93204 93204->93201 93206 e4c342 93204->93206 93205 e4bbe0 40 API calls 93205->93208 93550 e4a704 22 API calls messages 93206->93550 93208->93163 93208->93164 93208->93166 93208->93171 93208->93174 93208->93175 93208->93176 93208->93177 93208->93178 93208->93182 93208->93186 93208->93189 93208->93192 93208->93193 93208->93196 93208->93201 93208->93205 93209 e5fe0b 22 API calls 93208->93209 93543 e4ad81 93208->93543 93557 ea7099 22 API calls __fread_nolock 93208->93557 93558 ec5745 54 API calls _wcslen 93208->93558 93559 e5aa42 22 API calls messages 93208->93559 93560 eaf05c 40 API calls 93208->93560 93561 e4a993 41 API calls 93208->93561 93209->93208 93210->93088 93212 e5ee09 93211->93212 93214 e5ee12 93211->93214 93212->93088 93213 e5ee36 IsDialogMessageW 93213->93212 93213->93214 93214->93212 93214->93213 93215 e9efaf GetClassLongW 93214->93215 93215->93213 93215->93214 93217 eabe5d 93216->93217 93219 eabe78 93216->93219 93217->93039 93218 eabea6 93218->93039 93219->93218 93220 eabe94 Sleep 93219->93220 93220->93218 93222->93088 93223->93051 93224->93088 93225->93088 93226->93039 93227->93060 93228->93081 93231 e4ec76 messages 93229->93231 93230 e600a3 29 API calls pre_c_initialization 93230->93231 93231->93230 93232 e5fddb 22 API calls 93231->93232 93233 e4fef7 93231->93233 93236 e94b0b 93231->93236 93237 e4a8c7 22 API calls 93231->93237 93238 e94600 93231->93238 93243 e60242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 93231->93243 93245 e4ed9d messages 93231->93245 93246 e4fbe3 93231->93246 93247 e4a961 22 API calls 93231->93247 93250 e94beb 93231->93250 93251 e601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 93231->93251 93252 e4f3ae messages 93231->93252 93576 e501e0 348 API calls 2 library calls 93231->93576 93577 e506a0 41 API calls messages 93231->93577 93232->93231 93233->93245 93579 e4a8c7 22 API calls __fread_nolock 93233->93579 93581 eb359c 82 API calls __wsopen_s 93236->93581 93237->93231 93238->93245 93578 e4a8c7 22 API calls __fread_nolock 93238->93578 93243->93231 93245->93077 93246->93245 93248 e94bdc 93246->93248 93246->93252 93247->93231 93582 eb359c 82 API calls __wsopen_s 93248->93582 93583 eb359c 82 API calls __wsopen_s 93250->93583 93251->93231 93252->93245 93580 eb359c 82 API calls __wsopen_s 93252->93580 93253->93081 93254->93067 93255->93067 93256->93066 93257->93072 93258->93048 93584 eadef7 93259->93584 93261 ead5db CloseHandle 93261->93052 93262 ead529 Process32NextW 93262->93261 93268 ead522 93262->93268 93263 e4a961 22 API calls 93263->93268 93264 e49cb3 22 API calls 93264->93268 93268->93261 93268->93262 93268->93263 93268->93264 93590 e4525f 22 API calls 93268->93590 93591 e46350 22 API calls 93268->93591 93592 e5ce60 41 API calls 93268->93592 93270 e4ec40 348 API calls 93269->93270 93272 e4d29d 93270->93272 93271 e4d30b messages 93271->93095 93272->93271 93273 e4d6d5 93272->93273 93275 e4d3c3 93272->93275 93280 e4d4b8 93272->93280 93286 e91bc4 93272->93286 93290 e5fddb 22 API calls 93272->93290 93296 e4d429 __fread_nolock messages 93272->93296 93273->93271 93284 e5fe0b 22 API calls 93273->93284 93275->93273 93277 e4d3ce 93275->93277 93276 e4d5ff 93278 e4d614 93276->93278 93279 e91bb5 93276->93279 93281 e5fddb 22 API calls 93277->93281 93282 e5fddb 22 API calls 93278->93282 93309 ec5705 23 API calls 93279->93309 93285 e5fe0b 22 API calls 93280->93285 93289 e4d3d5 __fread_nolock 93281->93289 93294 e4d46a 93282->93294 93284->93289 93285->93296 93310 eb359c 82 API calls __wsopen_s 93286->93310 93287 e5fddb 22 API calls 93288 e4d3f6 93287->93288 93288->93296 93302 e4bec0 348 API calls 93288->93302 93289->93287 93289->93288 93290->93272 93292 e91ba4 93308 eb359c 82 API calls __wsopen_s 93292->93308 93294->93095 93296->93276 93296->93292 93296->93294 93297 e91b7f 93296->93297 93299 e91b5d 93296->93299 93303 e41f6f 93296->93303 93307 eb359c 82 API calls __wsopen_s 93297->93307 93306 eb359c 82 API calls __wsopen_s 93299->93306 93301->93096 93302->93296 93304 e4ec40 348 API calls 93303->93304 93305 e41f98 93304->93305 93305->93296 93306->93294 93307->93294 93308->93294 93309->93286 93310->93271 93361 e47510 93311->93361 93315 eb5c77 93315->93143 93393 ecaff9 93316->93393 93320 ecaff9 217 API calls 93319->93320 93322 ecac0c 93320->93322 93321 ecac54 93321->93143 93322->93321 93323 e4aceb 23 API calls 93322->93323 93323->93321 93325 e47510 53 API calls 93324->93325 93326 eca306 93325->93326 93327 ead4dc 47 API calls 93326->93327 93328 eca315 93327->93328 93328->93143 93521 ed2ad8 93329->93521 93331 ed159f 93331->93143 93333 e4b567 39 API calls 93332->93333 93334 e5f659 93333->93334 93335 e5f661 timeGetTime 93334->93335 93336 e9f2dc Sleep 93334->93336 93337 e4b567 39 API calls 93335->93337 93338 e5f677 93337->93338 93338->93143 93339->93146 93340->93105 93341->93107 93343 e4acf9 93342->93343 93351 e4ad2a messages 93342->93351 93344 e4ad55 93343->93344 93345 e4ad01 messages 93343->93345 93344->93351 93532 e4a8c7 22 API calls __fread_nolock 93344->93532 93347 e8fa48 93345->93347 93348 e4ad21 93345->93348 93345->93351 93347->93351 93533 e5ce17 22 API calls messages 93347->93533 93349 e8fa3a VariantClear 93348->93349 93348->93351 93349->93351 93351->93117 93352->93123 93353->93123 93354->93113 93355->93140 93356->93140 93357->93140 93358->93139 93359->93143 93360->93140 93362 e47525 93361->93362 93363 e47522 93361->93363 93364 e4752d 93362->93364 93365 e4755b 93362->93365 93384 eadbbe lstrlenW 93363->93384 93389 e651c6 26 API calls 93364->93389 93366 e850f6 93365->93366 93368 e4756d 93365->93368 93376 e8500f 93365->93376 93392 e65183 26 API calls 93366->93392 93390 e5fb21 51 API calls 93368->93390 93369 e4753d 93374 e5fddb 22 API calls 93369->93374 93372 e8510e 93372->93372 93377 e47547 93374->93377 93375 e85088 93391 e5fb21 51 API calls 93375->93391 93376->93375 93379 e5fe0b 22 API calls 93376->93379 93378 e49cb3 22 API calls 93377->93378 93378->93363 93380 e85058 93379->93380 93381 e5fddb 22 API calls 93380->93381 93382 e8507f 93381->93382 93383 e49cb3 22 API calls 93382->93383 93383->93375 93385 eadbdc GetFileAttributesW 93384->93385 93386 eadc06 93384->93386 93385->93386 93387 eadbe8 FindFirstFileW 93385->93387 93386->93315 93387->93386 93388 eadbf9 FindClose 93387->93388 93388->93386 93389->93369 93390->93369 93391->93366 93392->93372 93394 ecb01d ___scrt_fastfail 93393->93394 93395 ecb058 93394->93395 93396 ecb094 93394->93396 93491 e4b567 93395->93491 93398 e4b567 39 API calls 93396->93398 93403 ecb08b 93396->93403 93402 ecb0a5 93398->93402 93399 ecb063 93399->93403 93406 e4b567 39 API calls 93399->93406 93400 ecb0ed 93401 e47510 53 API calls 93400->93401 93404 ecb10b 93401->93404 93405 e4b567 39 API calls 93402->93405 93403->93400 93407 e4b567 39 API calls 93403->93407 93484 e47620 93404->93484 93405->93403 93409 ecb078 93406->93409 93407->93400 93411 e4b567 39 API calls 93409->93411 93410 ecb115 93412 ecb11f 93410->93412 93413 ecb1d8 93410->93413 93411->93403 93414 e47510 53 API calls 93412->93414 93415 ecb20a GetCurrentDirectoryW 93413->93415 93418 e47510 53 API calls 93413->93418 93416 ecb130 93414->93416 93417 e5fe0b 22 API calls 93415->93417 93420 e47620 22 API calls 93416->93420 93421 ecb22f GetCurrentDirectoryW 93417->93421 93419 ecb1ef 93418->93419 93422 e47620 22 API calls 93419->93422 93423 ecb13a 93420->93423 93424 ecb23c 93421->93424 93425 ecb1f9 _wcslen 93422->93425 93426 e47510 53 API calls 93423->93426 93428 ecb275 93424->93428 93496 e49c6e 22 API calls 93424->93496 93425->93415 93425->93428 93427 ecb14b 93426->93427 93429 e47620 22 API calls 93427->93429 93433 ecb28b 93428->93433 93434 ecb287 93428->93434 93431 ecb155 93429->93431 93435 e47510 53 API calls 93431->93435 93432 ecb255 93497 e49c6e 22 API calls 93432->93497 93499 eb07c0 10 API calls 93433->93499 93443 ecb2f8 93434->93443 93444 ecb39a CreateProcessW 93434->93444 93438 ecb166 93435->93438 93440 e47620 22 API calls 93438->93440 93439 ecb265 93498 e49c6e 22 API calls 93439->93498 93445 ecb170 93440->93445 93442 ecb294 93500 eb06e6 10 API calls 93442->93500 93502 ea11c8 39 API calls 93443->93502 93451 ecb32f _wcslen 93444->93451 93449 ecb1a6 GetSystemDirectoryW 93445->93449 93454 e47510 53 API calls 93445->93454 93448 ecb2fd 93452 ecb32a 93448->93452 93453 ecb323 93448->93453 93456 e5fe0b 22 API calls 93449->93456 93450 ecb2aa 93501 eb05a7 8 API calls 93450->93501 93465 ecb42f CloseHandle 93451->93465 93466 ecb3d6 GetLastError 93451->93466 93504 ea14ce 6 API calls 93452->93504 93503 ea1201 128 API calls 2 library calls 93453->93503 93458 ecb187 93454->93458 93460 ecb1cb GetSystemDirectoryW 93456->93460 93462 e47620 22 API calls 93458->93462 93460->93424 93461 ecb328 93461->93451 93464 ecb191 _wcslen 93462->93464 93463 ecb2d0 93463->93434 93464->93424 93464->93449 93467 ecb43f 93465->93467 93475 ecb49a 93465->93475 93474 ecb41a 93466->93474 93469 ecb446 CloseHandle 93467->93469 93470 ecb451 93467->93470 93469->93470 93472 ecb458 CloseHandle 93470->93472 93473 ecb463 93470->93473 93471 ecb4a6 93471->93474 93472->93473 93476 ecb46a CloseHandle 93473->93476 93477 ecb475 93473->93477 93488 eb0175 93474->93488 93475->93471 93481 ecb4d2 CloseHandle 93475->93481 93476->93477 93505 eb09d9 34 API calls 93477->93505 93480 ecb486 93506 ecb536 25 API calls 93480->93506 93481->93474 93485 e4762a _wcslen 93484->93485 93486 e5fe0b 22 API calls 93485->93486 93487 e4763f 93486->93487 93487->93410 93507 eb030f 93488->93507 93492 e4b578 93491->93492 93493 e4b57f 93491->93493 93492->93493 93520 e662d1 39 API calls 93492->93520 93493->93399 93495 e4b5c2 93495->93399 93496->93432 93497->93439 93498->93428 93499->93442 93500->93450 93501->93463 93502->93448 93503->93461 93504->93451 93505->93480 93506->93475 93508 eb0329 93507->93508 93509 eb0321 CloseHandle 93507->93509 93510 eb032e CloseHandle 93508->93510 93511 eb0336 93508->93511 93509->93508 93510->93511 93512 eb033b CloseHandle 93511->93512 93513 eb0343 93511->93513 93512->93513 93514 eb0348 CloseHandle 93513->93514 93515 eb0350 93513->93515 93514->93515 93516 eb035d 93515->93516 93517 eb0355 CloseHandle 93515->93517 93518 eb017d 93516->93518 93519 eb0362 CloseHandle 93516->93519 93517->93516 93518->93143 93519->93518 93520->93495 93522 e4aceb 23 API calls 93521->93522 93523 ed2af3 93522->93523 93524 ed2b1d 93523->93524 93525 ed2aff 93523->93525 93526 e46b57 22 API calls 93524->93526 93527 e47510 53 API calls 93525->93527 93530 ed2b1b 93526->93530 93528 ed2b0c 93527->93528 93528->93530 93531 e4a8c7 22 API calls __fread_nolock 93528->93531 93530->93331 93531->93530 93532->93351 93533->93351 93535 e4ae01 93534->93535 93538 e4ae1c messages 93534->93538 93536 e4aec9 22 API calls 93535->93536 93537 e4ae09 CharUpperBuffW 93536->93537 93537->93538 93538->93155 93540 e4acae 93539->93540 93541 e4acd1 93540->93541 93567 eb359c 82 API calls __wsopen_s 93540->93567 93541->93208 93544 e8fadb 93543->93544 93545 e4ad92 93543->93545 93546 e5fddb 22 API calls 93545->93546 93547 e4ad99 93546->93547 93568 e4adcd 93547->93568 93550->93200 93551->93200 93552->93159 93553->93196 93554->93175 93555->93196 93556->93196 93557->93208 93558->93208 93559->93208 93560->93208 93561->93208 93562->93189 93563->93196 93564->93193 93565->93194 93566->93196 93567->93541 93572 e4addd 93568->93572 93569 e4adb6 93569->93208 93570 e5fddb 22 API calls 93570->93572 93571 e4a961 22 API calls 93571->93572 93572->93569 93572->93570 93572->93571 93574 e4adcd 22 API calls 93572->93574 93575 e4a8c7 22 API calls __fread_nolock 93572->93575 93574->93572 93575->93572 93576->93231 93577->93231 93578->93245 93579->93245 93580->93245 93581->93245 93582->93250 93583->93245 93585 eadf02 93584->93585 93586 eadf19 93585->93586 93589 eadf1f 93585->93589 93593 e663b2 GetStringTypeW _strftime 93585->93593 93594 e662fb 39 API calls 93586->93594 93589->93268 93590->93268 93591->93268 93592->93268 93593->93585 93594->93589 93595 e43156 93598 e43170 93595->93598 93599 e43187 93598->93599 93600 e4318c 93599->93600 93601 e431eb 93599->93601 93635 e431e9 93599->93635 93602 e43265 PostQuitMessage 93600->93602 93603 e43199 93600->93603 93605 e82dfb 93601->93605 93606 e431f1 93601->93606 93640 e4316a 93602->93640 93608 e431a4 93603->93608 93609 e82e7c 93603->93609 93604 e431d0 DefWindowProcW 93604->93640 93653 e418e2 10 API calls 93605->93653 93610 e4321d SetTimer RegisterWindowMessageW 93606->93610 93611 e431f8 93606->93611 93613 e82e68 93608->93613 93614 e431ae 93608->93614 93656 eabf30 34 API calls ___scrt_fastfail 93609->93656 93615 e43246 CreatePopupMenu 93610->93615 93610->93640 93617 e82d9c 93611->93617 93618 e43201 KillTimer 93611->93618 93612 e82e1c 93654 e5e499 42 API calls 93612->93654 93643 eac161 93613->93643 93621 e82e4d 93614->93621 93622 e431b9 93614->93622 93615->93640 93624 e82da1 93617->93624 93625 e82dd7 MoveWindow 93617->93625 93626 e430f2 Shell_NotifyIconW 93618->93626 93621->93604 93655 ea0ad7 22 API calls 93621->93655 93628 e43253 93622->93628 93637 e431c4 93622->93637 93623 e82e8e 93623->93604 93623->93640 93629 e82dc6 SetFocus 93624->93629 93630 e82da7 93624->93630 93625->93640 93627 e43214 93626->93627 93650 e43c50 DeleteObject DestroyWindow 93627->93650 93651 e4326f 44 API calls ___scrt_fastfail 93628->93651 93629->93640 93633 e82db0 93630->93633 93630->93637 93652 e418e2 10 API calls 93633->93652 93635->93604 93636 e43263 93636->93640 93637->93604 93639 e430f2 Shell_NotifyIconW 93637->93639 93641 e82e41 93639->93641 93642 e43837 49 API calls 93641->93642 93642->93635 93644 eac179 ___scrt_fastfail 93643->93644 93645 eac276 93643->93645 93646 e43923 24 API calls 93644->93646 93645->93640 93648 eac1a0 93646->93648 93647 eac25f KillTimer SetTimer 93647->93645 93648->93647 93649 eac251 Shell_NotifyIconW 93648->93649 93649->93647 93650->93640 93651->93636 93652->93640 93653->93612 93654->93637 93655->93635 93656->93623 93657 e42e37 93658 e4a961 22 API calls 93657->93658 93659 e42e4d 93658->93659 93736 e44ae3 93659->93736 93661 e42e6b 93662 e43a5a 24 API calls 93661->93662 93663 e42e7f 93662->93663 93664 e49cb3 22 API calls 93663->93664 93665 e42e8c 93664->93665 93666 e44ecb 94 API calls 93665->93666 93667 e42ea5 93666->93667 93668 e82cb0 93667->93668 93669 e42ead 93667->93669 93670 eb2cf9 80 API calls 93668->93670 93750 e4a8c7 22 API calls __fread_nolock 93669->93750 93671 e82cc3 93670->93671 93672 e82ccf 93671->93672 93674 e44f39 68 API calls 93671->93674 93677 e44f39 68 API calls 93672->93677 93674->93672 93675 e42ec3 93751 e46f88 22 API calls 93675->93751 93679 e82ce5 93677->93679 93678 e42ecf 93680 e49cb3 22 API calls 93678->93680 93768 e43084 22 API calls 93679->93768 93681 e42edc 93680->93681 93752 e4a81b 41 API calls 93681->93752 93683 e42eec 93686 e49cb3 22 API calls 93683->93686 93685 e82d02 93769 e43084 22 API calls 93685->93769 93688 e42f12 93686->93688 93753 e4a81b 41 API calls 93688->93753 93689 e82d1e 93691 e43a5a 24 API calls 93689->93691 93692 e82d44 93691->93692 93770 e43084 22 API calls 93692->93770 93693 e42f21 93696 e4a961 22 API calls 93693->93696 93695 e82d50 93771 e4a8c7 22 API calls __fread_nolock 93695->93771 93698 e42f3f 93696->93698 93754 e43084 22 API calls 93698->93754 93699 e82d5e 93772 e43084 22 API calls 93699->93772 93701 e42f4b 93755 e64a28 40 API calls 3 library calls 93701->93755 93704 e82d6d 93773 e4a8c7 22 API calls __fread_nolock 93704->93773 93705 e42f59 93705->93679 93706 e42f63 93705->93706 93756 e64a28 40 API calls 3 library calls 93706->93756 93709 e82d83 93774 e43084 22 API calls 93709->93774 93710 e42f6e 93710->93685 93712 e42f78 93710->93712 93757 e64a28 40 API calls 3 library calls 93712->93757 93713 e82d90 93715 e42f83 93715->93689 93716 e42f8d 93715->93716 93758 e64a28 40 API calls 3 library calls 93716->93758 93718 e42f98 93719 e42fdc 93718->93719 93759 e43084 22 API calls 93718->93759 93719->93704 93720 e42fe8 93719->93720 93720->93713 93762 e463eb 22 API calls 93720->93762 93722 e42fbf 93760 e4a8c7 22 API calls __fread_nolock 93722->93760 93725 e42ff8 93763 e46a50 22 API calls 93725->93763 93726 e42fcd 93761 e43084 22 API calls 93726->93761 93729 e43006 93764 e470b0 23 API calls 93729->93764 93733 e43021 93734 e43065 93733->93734 93765 e46f88 22 API calls 93733->93765 93766 e470b0 23 API calls 93733->93766 93767 e43084 22 API calls 93733->93767 93737 e44af0 __wsopen_s 93736->93737 93738 e46b57 22 API calls 93737->93738 93739 e44b22 93737->93739 93738->93739 93741 e44b58 93739->93741 93775 e44c6d 93739->93775 93742 e44c29 93741->93742 93745 e49cb3 22 API calls 93741->93745 93747 e44c6d 22 API calls 93741->93747 93749 e4515f 22 API calls 93741->93749 93743 e49cb3 22 API calls 93742->93743 93744 e44c5e 93742->93744 93746 e44c52 93743->93746 93744->93661 93745->93741 93748 e4515f 22 API calls 93746->93748 93747->93741 93748->93744 93749->93741 93750->93675 93751->93678 93752->93683 93753->93693 93754->93701 93755->93705 93756->93710 93757->93715 93758->93718 93759->93722 93760->93726 93761->93719 93762->93725 93763->93729 93764->93733 93765->93733 93766->93733 93767->93733 93768->93685 93769->93689 93770->93695 93771->93699 93772->93704 93773->93709 93774->93713 93776 e4aec9 22 API calls 93775->93776 93777 e44c78 93776->93777 93777->93739 93778 e41033 93783 e44c91 93778->93783 93782 e41042 93784 e4a961 22 API calls 93783->93784 93785 e44cff 93784->93785 93791 e43af0 93785->93791 93788 e44d9c 93789 e41038 93788->93789 93794 e451f7 22 API calls __fread_nolock 93788->93794 93790 e600a3 29 API calls __onexit 93789->93790 93790->93782 93795 e43b1c 93791->93795 93794->93788 93796 e43b0f 93795->93796 93797 e43b29 93795->93797 93796->93788 93797->93796 93798 e43b30 RegOpenKeyExW 93797->93798 93798->93796 93799 e43b4a RegQueryValueExW 93798->93799 93800 e43b80 RegCloseKey 93799->93800 93801 e43b6b 93799->93801 93800->93796 93801->93800 93802 e4defc 93805 e41d6f 93802->93805 93804 e4df07 93806 e41d8c 93805->93806 93807 e41f6f 348 API calls 93806->93807 93808 e41da6 93807->93808 93809 e82759 93808->93809 93811 e41e36 93808->93811 93812 e41dc2 93808->93812 93815 eb359c 82 API calls __wsopen_s 93809->93815 93811->93804 93812->93811 93814 e4289a 23 API calls 93812->93814 93814->93811 93815->93811 93816 ed2a55 93824 eb1ebc 93816->93824 93819 ed2a87 93820 ed2a70 93826 ea39c0 22 API calls 93820->93826 93822 ed2a7c 93827 ea417d 22 API calls __fread_nolock 93822->93827 93825 eb1ec3 IsWindow 93824->93825 93825->93819 93825->93820 93826->93822 93827->93819 93828 e4f7bf 93829 e4fcb6 93828->93829 93830 e4f7d3 93828->93830 93831 e4aceb 23 API calls 93829->93831 93832 e4fcc2 93830->93832 93834 e5fddb 22 API calls 93830->93834 93831->93832 93833 e4aceb 23 API calls 93832->93833 93837 e4fd3d 93833->93837 93835 e4f7e5 93834->93835 93835->93832 93836 e4f83e 93835->93836 93835->93837 93839 e51310 348 API calls 93836->93839 93854 e4ed9d messages 93836->93854 93865 eb1155 22 API calls 93837->93865 93861 e4ec76 messages 93839->93861 93840 e5fddb 22 API calls 93840->93861 93841 e4fef7 93841->93854 93867 e4a8c7 22 API calls __fread_nolock 93841->93867 93844 e94b0b 93869 eb359c 82 API calls __wsopen_s 93844->93869 93845 e4a8c7 22 API calls 93845->93861 93846 e94600 93846->93854 93866 e4a8c7 22 API calls __fread_nolock 93846->93866 93852 e60242 EnterCriticalSection LeaveCriticalSection LeaveCriticalSection WaitForSingleObjectEx EnterCriticalSection 93852->93861 93853 e4fbe3 93853->93854 93856 e94bdc 93853->93856 93862 e4f3ae messages 93853->93862 93855 e4a961 22 API calls 93855->93861 93870 eb359c 82 API calls __wsopen_s 93856->93870 93858 e601f8 EnterCriticalSection LeaveCriticalSection SetEvent ResetEvent __Init_thread_footer 93858->93861 93859 e94beb 93871 eb359c 82 API calls __wsopen_s 93859->93871 93860 e600a3 29 API calls pre_c_initialization 93860->93861 93861->93840 93861->93841 93861->93844 93861->93845 93861->93846 93861->93852 93861->93853 93861->93854 93861->93855 93861->93858 93861->93859 93861->93860 93861->93862 93863 e501e0 348 API calls 2 library calls 93861->93863 93864 e506a0 41 API calls messages 93861->93864 93862->93854 93868 eb359c 82 API calls __wsopen_s 93862->93868 93863->93861 93864->93861 93865->93854 93866->93854 93867->93854 93868->93854 93869->93854 93870->93859 93871->93854 93872 e41098 93877 e442de 93872->93877 93876 e410a7 93878 e4a961 22 API calls 93877->93878 93879 e442f5 GetVersionExW 93878->93879 93880 e46b57 22 API calls 93879->93880 93881 e44342 93880->93881 93882 e493b2 22 API calls 93881->93882 93893 e44378 93881->93893 93883 e4436c 93882->93883 93885 e437a0 22 API calls 93883->93885 93884 e4441b GetCurrentProcess IsWow64Process 93886 e44437 93884->93886 93885->93893 93887 e4444f LoadLibraryA 93886->93887 93888 e83824 GetSystemInfo 93886->93888 93889 e44460 GetProcAddress 93887->93889 93890 e4449c GetSystemInfo 93887->93890 93889->93890 93891 e44470 GetNativeSystemInfo 93889->93891 93892 e44476 93890->93892 93891->93892 93895 e4109d 93892->93895 93896 e4447a FreeLibrary 93892->93896 93893->93884 93894 e837df 93893->93894 93897 e600a3 29 API calls __onexit 93895->93897 93896->93895 93897->93876 93898 e93f75 93909 e5ceb1 93898->93909 93900 e93f8b 93901 e94006 93900->93901 93918 e5e300 23 API calls 93900->93918 93903 e4bf40 348 API calls 93901->93903 93904 e94052 93903->93904 93908 e94a88 93904->93908 93920 eb359c 82 API calls __wsopen_s 93904->93920 93906 e93fe6 93906->93904 93919 eb1abf 22 API calls 93906->93919 93910 e5ced2 93909->93910 93911 e5cebf 93909->93911 93912 e5cf05 93910->93912 93913 e5ced7 93910->93913 93914 e4aceb 23 API calls 93911->93914 93916 e4aceb 23 API calls 93912->93916 93915 e5fddb 22 API calls 93913->93915 93917 e5cec9 93914->93917 93915->93917 93916->93917 93917->93900 93918->93906 93919->93901 93920->93908 93921 e603fb 93922 e60407 ___scrt_is_nonwritable_in_current_image 93921->93922 93950 e5feb1 93922->93950 93924 e6040e 93925 e60561 93924->93925 93928 e60438 93924->93928 93980 e6083f IsProcessorFeaturePresent IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter ___scrt_fastfail 93925->93980 93927 e60568 93973 e64e52 93927->93973 93939 e60477 ___scrt_is_nonwritable_in_current_image ___scrt_release_startup_lock 93928->93939 93961 e7247d 93928->93961 93934 e60457 93937 e604d8 93969 e60959 93937->93969 93939->93937 93976 e64e1a 38 API calls 3 library calls 93939->93976 93941 e604de 93942 e604f3 93941->93942 93977 e60992 GetModuleHandleW 93942->93977 93944 e604fa 93944->93927 93945 e604fe 93944->93945 93946 e60507 93945->93946 93978 e64df5 28 API calls _abort 93945->93978 93979 e60040 13 API calls 2 library calls 93946->93979 93949 e6050f 93949->93934 93951 e5feba 93950->93951 93982 e60698 IsProcessorFeaturePresent 93951->93982 93953 e5fec6 93983 e62c94 10 API calls 3 library calls 93953->93983 93955 e5fecb 93956 e5fecf 93955->93956 93984 e72317 93955->93984 93956->93924 93959 e5fee6 93959->93924 93962 e72494 93961->93962 93963 e60a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 93962->93963 93964 e60451 93963->93964 93964->93934 93965 e72421 93964->93965 93967 e72450 93965->93967 93966 e60a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 93968 e72479 93966->93968 93967->93966 93968->93939 94035 e62340 93969->94035 93972 e6097f 93972->93941 94037 e64bcf 93973->94037 93976->93937 93977->93944 93978->93946 93979->93949 93980->93927 93982->93953 93983->93955 93988 e7d1f6 93984->93988 93987 e62cbd 8 API calls 3 library calls 93987->93956 93991 e7d213 93988->93991 93992 e7d20f 93988->93992 93990 e5fed8 93990->93959 93990->93987 93991->93992 93994 e74bfb 93991->93994 94006 e60a8c 93992->94006 93995 e74c07 ___scrt_is_nonwritable_in_current_image 93994->93995 94013 e72f5e EnterCriticalSection 93995->94013 93997 e74c0e 94014 e750af 93997->94014 93999 e74c1d 94005 e74c2c 93999->94005 94027 e74a8f 29 API calls 93999->94027 94002 e74c27 94028 e74b45 GetStdHandle GetFileType 94002->94028 94003 e74c3d __fread_nolock 94003->93991 94029 e74c48 LeaveCriticalSection _abort 94005->94029 94007 e60a97 IsProcessorFeaturePresent 94006->94007 94008 e60a95 94006->94008 94010 e60c5d 94007->94010 94008->93990 94034 e60c21 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 94010->94034 94012 e60d40 94012->93990 94013->93997 94015 e750bb ___scrt_is_nonwritable_in_current_image 94014->94015 94016 e750df 94015->94016 94017 e750c8 94015->94017 94030 e72f5e EnterCriticalSection 94016->94030 94031 e6f2d9 20 API calls __dosmaperr 94017->94031 94020 e750cd 94032 e727ec 26 API calls __fread_nolock 94020->94032 94021 e750eb 94025 e75000 __wsopen_s 21 API calls 94021->94025 94026 e75117 94021->94026 94023 e750d7 __fread_nolock 94023->93999 94025->94021 94033 e7513e LeaveCriticalSection _abort 94026->94033 94027->94002 94028->94005 94029->94003 94030->94021 94031->94020 94032->94023 94033->94023 94034->94012 94036 e6096c GetStartupInfoW 94035->94036 94036->93972 94038 e64bdb __FrameHandler3::FrameUnwindToState 94037->94038 94039 e64bf4 94038->94039 94040 e64be2 94038->94040 94061 e72f5e EnterCriticalSection 94039->94061 94076 e64d29 GetModuleHandleW 94040->94076 94043 e64be7 94043->94039 94077 e64d6d GetModuleHandleExW 94043->94077 94044 e64c99 94065 e64cd9 94044->94065 94049 e64c70 94050 e64c88 94049->94050 94056 e72421 _abort 5 API calls 94049->94056 94057 e72421 _abort 5 API calls 94050->94057 94051 e64bfb 94051->94044 94051->94049 94062 e721a8 94051->94062 94052 e64cb6 94068 e64ce8 94052->94068 94053 e64ce2 94085 e81d29 5 API calls __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 94053->94085 94056->94050 94057->94044 94061->94051 94086 e71ee1 94062->94086 94105 e72fa6 LeaveCriticalSection 94065->94105 94067 e64cb2 94067->94052 94067->94053 94106 e7360c 94068->94106 94071 e64d16 94074 e64d6d _abort 8 API calls 94071->94074 94072 e64cf6 GetPEB 94072->94071 94073 e64d06 GetCurrentProcess TerminateProcess 94072->94073 94073->94071 94075 e64d1e ExitProcess 94074->94075 94076->94043 94078 e64d97 GetProcAddress 94077->94078 94079 e64dba 94077->94079 94082 e64dac 94078->94082 94080 e64dc0 FreeLibrary 94079->94080 94081 e64dc9 94079->94081 94080->94081 94083 e60a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94081->94083 94082->94079 94084 e64bf3 94083->94084 94084->94039 94089 e71e90 94086->94089 94088 e71f05 94088->94049 94090 e71e9c ___scrt_is_nonwritable_in_current_image 94089->94090 94097 e72f5e EnterCriticalSection 94090->94097 94092 e71eaa 94098 e71f31 94092->94098 94096 e71ec8 __fread_nolock 94096->94088 94097->94092 94099 e71f51 94098->94099 94100 e71f59 94098->94100 94101 e60a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94099->94101 94100->94099 94103 e729c8 _free 20 API calls 94100->94103 94102 e71eb7 94101->94102 94104 e71ed5 LeaveCriticalSection _abort 94102->94104 94103->94099 94104->94096 94105->94067 94107 e73627 94106->94107 94108 e73631 94106->94108 94110 e60a8c __ehhandler$?ConvertBSTRToString@_com_util@@YGPADPAG@Z 5 API calls 94107->94110 94113 e72fd7 5 API calls 2 library calls 94108->94113 94111 e64cf2 94110->94111 94111->94071 94111->94072 94112 e73648 94112->94107 94113->94112 94114 e4105b 94119 e4344d 94114->94119 94116 e4106a 94150 e600a3 29 API calls __onexit 94116->94150 94118 e41074 94120 e4345d __wsopen_s 94119->94120 94121 e4a961 22 API calls 94120->94121 94122 e43513 94121->94122 94123 e43a5a 24 API calls 94122->94123 94124 e4351c 94123->94124 94151 e43357 94124->94151 94127 e433c6 22 API calls 94128 e43535 94127->94128 94129 e4515f 22 API calls 94128->94129 94130 e43544 94129->94130 94131 e4a961 22 API calls 94130->94131 94132 e4354d 94131->94132 94133 e4a6c3 22 API calls 94132->94133 94134 e43556 RegOpenKeyExW 94133->94134 94135 e83176 RegQueryValueExW 94134->94135 94139 e43578 94134->94139 94136 e8320c RegCloseKey 94135->94136 94137 e83193 94135->94137 94136->94139 94142 e8321e _wcslen 94136->94142 94138 e5fe0b 22 API calls 94137->94138 94140 e831ac 94138->94140 94139->94116 94141 e45722 22 API calls 94140->94141 94143 e831b7 RegQueryValueExW 94141->94143 94142->94139 94147 e44c6d 22 API calls 94142->94147 94148 e49cb3 22 API calls 94142->94148 94149 e4515f 22 API calls 94142->94149 94144 e831ee messages 94143->94144 94145 e831d4 94143->94145 94144->94136 94146 e46b57 22 API calls 94145->94146 94146->94144 94147->94142 94148->94142 94149->94142 94150->94118 94152 e81f50 __wsopen_s 94151->94152 94153 e43364 GetFullPathNameW 94152->94153 94154 e43386 94153->94154 94155 e46b57 22 API calls 94154->94155 94156 e433a4 94155->94156 94156->94127

                                                                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                                                                            • Executed
                                                                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                                                                            control_flow_graph 379 e442de-e4434d call e4a961 GetVersionExW call e46b57 384 e44353 379->384 385 e83617-e8362a 379->385 386 e44355-e44357 384->386 387 e8362b-e8362f 385->387 388 e4435d-e443bc call e493b2 call e437a0 386->388 389 e83656 386->389 390 e83631 387->390 391 e83632-e8363e 387->391 407 e443c2-e443c4 388->407 408 e837df-e837e6 388->408 394 e8365d-e83660 389->394 390->391 391->387 393 e83640-e83642 391->393 393->386 396 e83648-e8364f 393->396 397 e83666-e836a8 394->397 398 e4441b-e44435 GetCurrentProcess IsWow64Process 394->398 396->385 400 e83651 396->400 397->398 401 e836ae-e836b1 397->401 403 e44494-e4449a 398->403 404 e44437 398->404 400->389 405 e836db-e836e5 401->405 406 e836b3-e836bd 401->406 409 e4443d-e44449 403->409 404->409 413 e836f8-e83702 405->413 414 e836e7-e836f3 405->414 410 e836ca-e836d6 406->410 411 e836bf-e836c5 406->411 407->394 412 e443ca-e443dd 407->412 415 e837e8 408->415 416 e83806-e83809 408->416 417 e4444f-e4445e LoadLibraryA 409->417 418 e83824-e83828 GetSystemInfo 409->418 410->398 411->398 421 e443e3-e443e5 412->421 422 e83726-e8372f 412->422 424 e83704-e83710 413->424 425 e83715-e83721 413->425 414->398 423 e837ee 415->423 426 e8380b-e8381a 416->426 427 e837f4-e837fc 416->427 419 e44460-e4446e GetProcAddress 417->419 420 e4449c-e444a6 GetSystemInfo 417->420 419->420 428 e44470-e44474 GetNativeSystemInfo 419->428 429 e44476-e44478 420->429 430 e8374d-e83762 421->430 431 e443eb-e443ee 421->431 432 e8373c-e83748 422->432 433 e83731-e83737 422->433 423->427 424->398 425->398 426->423 434 e8381c-e83822 426->434 427->416 428->429 437 e44481-e44493 429->437 438 e4447a-e4447b FreeLibrary 429->438 435 e8376f-e8377b 430->435 436 e83764-e8376a 430->436 439 e443f4-e4440f 431->439 440 e83791-e83794 431->440 432->398 433->398 434->427 435->398 436->398 438->437 442 e44415 439->442 443 e83780-e8378c 439->443 440->398 441 e8379a-e837c1 440->441 444 e837ce-e837da 441->444 445 e837c3-e837c9 441->445 442->398 443->398 444->398 445->398
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetVersionExW.KERNEL32(?), ref: 00E4430D
                                                                                                                                                                                                                                              • Part of subcall function 00E46B57: _wcslen.LIBCMT ref: 00E46B6A
                                                                                                                                                                                                                                            • GetCurrentProcess.KERNEL32(?,00EDCB64,00000000,?,?), ref: 00E44422
                                                                                                                                                                                                                                            • IsWow64Process.KERNEL32(00000000,?,?), ref: 00E44429
                                                                                                                                                                                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?), ref: 00E44454
                                                                                                                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetNativeSystemInfo), ref: 00E44466
                                                                                                                                                                                                                                            • GetNativeSystemInfo.KERNELBASE(?,?,?), ref: 00E44474
                                                                                                                                                                                                                                            • FreeLibrary.KERNEL32(00000000,?,?), ref: 00E4447B
                                                                                                                                                                                                                                            • GetSystemInfo.KERNEL32(?,?,?), ref: 00E444A0
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: InfoLibraryProcessSystem$AddressCurrentFreeLoadNativeProcVersionWow64_wcslen
                                                                                                                                                                                                                                            • String ID: GetNativeSystemInfo$kernel32.dll$|O
                                                                                                                                                                                                                                            • API String ID: 3290436268-3101561225
                                                                                                                                                                                                                                            • Opcode ID: 55941ee0db4d2db7a7b1c936f5701276e1fbcfd795493416a6c3f8266a7ba100
                                                                                                                                                                                                                                            • Instruction ID: 7e891b8ae1a9f849d49a28f14ab25ab6c192494d1c276d11c875a358c8364e24
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 55941ee0db4d2db7a7b1c936f5701276e1fbcfd795493416a6c3f8266a7ba100
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 08A1E9A190A2CCCFCB11D7B97C443D57FE47B26744F1AE49AD2B5B3A6AD2204508FB21

                                                                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                                                                            • Executed
                                                                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                                                                            control_flow_graph 783 e442a2-e442ba CreateStreamOnHGlobal 784 e442bc-e442d3 FindResourceExW 783->784 785 e442da-e442dd 783->785 786 e835ba-e835c9 LoadResource 784->786 787 e442d9 784->787 786->787 788 e835cf-e835dd SizeofResource 786->788 787->785 788->787 789 e835e3-e835ee LockResource 788->789 789->787 790 e835f4-e83612 789->790 790->787
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CreateStreamOnHGlobal.COMBASE(00000000,00000001,?,?,?,?,?,00E450AA,?,?,00000000,00000000), ref: 00E442B2
                                                                                                                                                                                                                                            • FindResourceExW.KERNEL32(?,0000000A,SCRIPT,00000000,?,?,00E450AA,?,?,00000000,00000000), ref: 00E442C9
                                                                                                                                                                                                                                            • LoadResource.KERNEL32(?,00000000,?,?,00E450AA,?,?,00000000,00000000,?,?,?,?,?,?,00E44F20), ref: 00E835BE
                                                                                                                                                                                                                                            • SizeofResource.KERNEL32(?,00000000,?,?,00E450AA,?,?,00000000,00000000,?,?,?,?,?,?,00E44F20), ref: 00E835D3
                                                                                                                                                                                                                                            • LockResource.KERNEL32(00E450AA,?,?,00E450AA,?,?,00000000,00000000,?,?,?,?,?,?,00E44F20,?), ref: 00E835E6
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Resource$CreateFindGlobalLoadLockSizeofStream
                                                                                                                                                                                                                                            • String ID: SCRIPT
                                                                                                                                                                                                                                            • API String ID: 3051347437-3967369404
                                                                                                                                                                                                                                            • Opcode ID: bf7bf6858f7e86f03d62575d058c309ed6313114d24fcc938d0133725c613de7
                                                                                                                                                                                                                                            • Instruction ID: caefd118e8bb3fa077b05847d81d1a1f8703c33c99367eba407977702178dde0
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: bf7bf6858f7e86f03d62575d058c309ed6313114d24fcc938d0133725c613de7
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: BA1170B0201701BFDB219B66EC48F677BB9EBC5B95F20416EB406A62A0DBB1D804C620

                                                                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                                                                            • Executed
                                                                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                                                                            control_flow_graph 908 eadbbe-eadbda lstrlenW 909 eadbdc-eadbe6 GetFileAttributesW 908->909 910 eadc06 908->910 911 eadc09-eadc0d 909->911 912 eadbe8-eadbf7 FindFirstFileW 909->912 910->911 912->910 913 eadbf9-eadc04 FindClose 912->913 913->911
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • lstrlenW.KERNEL32(?,"R), ref: 00EADBCE
                                                                                                                                                                                                                                            • GetFileAttributesW.KERNELBASE(?), ref: 00EADBDD
                                                                                                                                                                                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00EADBEE
                                                                                                                                                                                                                                            • FindClose.KERNEL32(00000000), ref: 00EADBFA
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: FileFind$AttributesCloseFirstlstrlen
                                                                                                                                                                                                                                            • String ID: "R
                                                                                                                                                                                                                                            • API String ID: 2695905019-1746183819
                                                                                                                                                                                                                                            • Opcode ID: 23680e49f2c7b13fb65c4a8b442a3f815f9aa95cd02b832c9cda0759f026c88c
                                                                                                                                                                                                                                            • Instruction ID: 1ad0a862d29b0573d466b0620cedc4557a32206d62cf6bf6475ea8b42e7b5180
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 23680e49f2c7b13fb65c4a8b442a3f815f9aa95cd02b832c9cda0759f026c88c
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 49F0A7304159155B82206B78AC0D4AA777CDF06374B604713F476E24F0EBB46D58C595

                                                                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00E42B6B
                                                                                                                                                                                                                                              • Part of subcall function 00E43A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00F11418,?,00E42E7F,?,?,?,00000000), ref: 00E43A78
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                            • GetForegroundWindow.USER32(runas,?,?,?,?,?,00F02224), ref: 00E82C10
                                                                                                                                                                                                                                            • ShellExecuteW.SHELL32(00000000,?,?,00F02224), ref: 00E82C17
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CurrentDirectoryExecuteFileForegroundModuleNameShellWindow_wcslen
                                                                                                                                                                                                                                            • String ID: runas
                                                                                                                                                                                                                                            • API String ID: 448630720-4000483414
                                                                                                                                                                                                                                            • Opcode ID: 91ccb7d301ecea2c44e6622eebce02e93fdbbd6b1cf3b1bc7a50ffec73823a37
                                                                                                                                                                                                                                            • Instruction ID: f46fb37f4ff973cf8c4d50e6498dad5a10b0db843badc3088fa0bd293791ae82
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 91ccb7d301ecea2c44e6622eebce02e93fdbbd6b1cf3b1bc7a50ffec73823a37
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7B11E1316083056AC704FF70F8559AEB7E4EB95744F84342DF286320A3CF618A49E712

                                                                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                                                                            • Executed
                                                                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                                                                            control_flow_graph 961 e64ce8-e64cf4 call e7360c 964 e64d16-e64d22 call e64d6d ExitProcess 961->964 965 e64cf6-e64d04 GetPEB 961->965 965->964 966 e64d06-e64d10 GetCurrentProcess TerminateProcess 965->966 966->964
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetCurrentProcess.KERNEL32(00E728E9,(,00E64CBE,00000000,00F088B8,0000000C,00E64E15,(,00000002,00000000,?,00E728E9,00000003,00E72DF7,?,?), ref: 00E64D09
                                                                                                                                                                                                                                            • TerminateProcess.KERNEL32(00000000,?,00E728E9,00000003,00E72DF7,?,?,?,00E6E6D1,?,00F08A48,00000010,00E44F4A,?,?,00000000), ref: 00E64D10
                                                                                                                                                                                                                                            • ExitProcess.KERNEL32 ref: 00E64D22
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Process$CurrentExitTerminate
                                                                                                                                                                                                                                            • String ID: (
                                                                                                                                                                                                                                            • API String ID: 1703294689-2063206799
                                                                                                                                                                                                                                            • Opcode ID: b5860e9e460eb4ceea710090459c600ffbc555e125f38bdedb824db3c44d2c11
                                                                                                                                                                                                                                            • Instruction ID: 4134db315a9462d3e302e5a3d5ab8be46796b55628e27341bbf3d3b8cd90d96b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b5860e9e460eb4ceea710090459c600ffbc555e125f38bdedb824db3c44d2c11
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 91E0B6B1441149AFCF11AF65FD09A583B69EB417C5F209055FC09AB162CB35DD46DA80
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00EAD501
                                                                                                                                                                                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 00EAD50F
                                                                                                                                                                                                                                            • Process32NextW.KERNEL32(00000000,?), ref: 00EAD52F
                                                                                                                                                                                                                                            • CloseHandle.KERNELBASE(00000000), ref: 00EAD5DC
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Process32$CloseCreateFirstHandleNextSnapshotToolhelp32
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 420147892-0
                                                                                                                                                                                                                                            • Opcode ID: 0fd0f7bc04876bfc20f26b67ee6fea63bafc67718f910b1d4d173cdd78353189
                                                                                                                                                                                                                                            • Instruction ID: c6315df6c394dce4720fb49039a8b2a2441ac3719c3031c99d2c177eb480c223
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 0fd0f7bc04876bfc20f26b67ee6fea63bafc67718f910b1d4d173cdd78353189
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2331A4315083019FD304EF54EC81AAFBBF8EFD9354F14052DF582A61A2EB71A948CB92

                                                                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                                                                            • Executed
                                                                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                                                                            control_flow_graph 0 ecaff9-ecb056 call e62340 3 ecb058-ecb06b call e4b567 0->3 4 ecb094-ecb098 0->4 14 ecb06d-ecb092 call e4b567 * 2 3->14 15 ecb0c8 3->15 5 ecb0dd-ecb0e0 4->5 6 ecb09a-ecb0bb call e4b567 * 2 4->6 10 ecb0f5-ecb119 call e47510 call e47620 5->10 11 ecb0e2-ecb0e5 5->11 29 ecb0bf-ecb0c4 6->29 31 ecb11f-ecb178 call e47510 call e47620 call e47510 call e47620 call e47510 call e47620 10->31 32 ecb1d8-ecb1e0 10->32 16 ecb0e8-ecb0ed call e4b567 11->16 14->29 19 ecb0cb-ecb0cf 15->19 16->10 24 ecb0d9-ecb0db 19->24 25 ecb0d1-ecb0d7 19->25 24->5 24->10 25->16 29->5 33 ecb0c6 29->33 80 ecb17a-ecb195 call e47510 call e47620 31->80 81 ecb1a6-ecb1d6 GetSystemDirectoryW call e5fe0b GetSystemDirectoryW 31->81 36 ecb20a-ecb238 GetCurrentDirectoryW call e5fe0b GetCurrentDirectoryW 32->36 37 ecb1e2-ecb1fd call e47510 call e47620 32->37 33->19 46 ecb23c 36->46 37->36 50 ecb1ff-ecb208 call e64963 37->50 49 ecb240-ecb244 46->49 52 ecb275-ecb285 call eb00d9 49->52 53 ecb246-ecb270 call e49c6e * 3 49->53 50->36 50->52 62 ecb28b-ecb2e1 call eb07c0 call eb06e6 call eb05a7 52->62 63 ecb287-ecb289 52->63 53->52 66 ecb2ee-ecb2f2 62->66 99 ecb2e3 62->99 63->66 73 ecb2f8-ecb321 call ea11c8 66->73 74 ecb39a-ecb3be CreateProcessW 66->74 84 ecb32a call ea14ce 73->84 85 ecb323-ecb328 call ea1201 73->85 77 ecb3c1-ecb3d4 call e5fe14 * 2 74->77 103 ecb42f-ecb43d CloseHandle 77->103 104 ecb3d6-ecb3e8 77->104 80->81 107 ecb197-ecb1a0 call e64963 80->107 81->46 98 ecb32f-ecb33c call e64963 84->98 85->98 115 ecb33e-ecb345 98->115 116 ecb347-ecb357 call e64963 98->116 99->66 109 ecb49c 103->109 110 ecb43f-ecb444 103->110 105 ecb3ed-ecb3fc 104->105 106 ecb3ea 104->106 111 ecb3fe 105->111 112 ecb401-ecb42a GetLastError call e4630c call e4cfa0 105->112 106->105 107->49 107->81 113 ecb4a0-ecb4a4 109->113 117 ecb446-ecb44c CloseHandle 110->117 118 ecb451-ecb456 110->118 111->112 127 ecb4e5-ecb4f6 call eb0175 112->127 120 ecb4a6-ecb4b0 113->120 121 ecb4b2-ecb4bc 113->121 115->115 115->116 137 ecb359-ecb360 116->137 138 ecb362-ecb372 call e64963 116->138 117->118 124 ecb458-ecb45e CloseHandle 118->124 125 ecb463-ecb468 118->125 120->127 128 ecb4be 121->128 129 ecb4c4-ecb4e3 call e4cfa0 CloseHandle 121->129 124->125 131 ecb46a-ecb470 CloseHandle 125->131 132 ecb475-ecb49a call eb09d9 call ecb536 125->132 128->129 129->127 131->132 132->113 137->137 137->138 146 ecb37d-ecb398 call e5fe14 * 3 138->146 147 ecb374-ecb37b 138->147 146->77 147->146 147->147
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ECB198
                                                                                                                                                                                                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00ECB1B0
                                                                                                                                                                                                                                            • GetSystemDirectoryW.KERNEL32(00000000,00000000), ref: 00ECB1D4
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ECB200
                                                                                                                                                                                                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00ECB214
                                                                                                                                                                                                                                            • GetCurrentDirectoryW.KERNEL32(00000000,00000000), ref: 00ECB236
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ECB332
                                                                                                                                                                                                                                              • Part of subcall function 00EB05A7: GetStdHandle.KERNEL32(000000F6), ref: 00EB05C6
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ECB34B
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ECB366
                                                                                                                                                                                                                                            • CreateProcessW.KERNELBASE(00000000,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00ECB3B6
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(00000000), ref: 00ECB407
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00ECB439
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00ECB44A
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00ECB45C
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00ECB46E
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00ECB4E3
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Handle$Close_wcslen$Directory$CurrentSystem$CreateErrorLastProcess
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2178637699-0
                                                                                                                                                                                                                                            • Opcode ID: 3c3a5d3aeea8ef1dbc8507b9a76c1d882982e65b02e334f8906f05b916819a9a
                                                                                                                                                                                                                                            • Instruction ID: dce77466a729df91e970f1096f030c4562abbc21dc1dc3e8d5a18bc0250a01b3
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 3c3a5d3aeea8ef1dbc8507b9a76c1d882982e65b02e334f8906f05b916819a9a
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: EEF18B315083409FC714EF24D982B6EBBE5AF85314F14995DF899AB2A2DB32EC05CB52
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetInputState.USER32 ref: 00E4D807
                                                                                                                                                                                                                                            • timeGetTime.WINMM ref: 00E4DA07
                                                                                                                                                                                                                                            • PeekMessageW.USER32(?), ref: 00E4DB28
                                                                                                                                                                                                                                            • TranslateMessage.USER32(?), ref: 00E4DB7B
                                                                                                                                                                                                                                            • DispatchMessageW.USER32(?), ref: 00E4DB89
                                                                                                                                                                                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E4DB9F
                                                                                                                                                                                                                                            • Sleep.KERNELBASE(0000000A), ref: 00E4DBB1
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Message$Peek$DispatchInputSleepStateTimeTranslatetime
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2189390790-0
                                                                                                                                                                                                                                            • Opcode ID: 71d70a3cd8a9c92333c316fe91c99806dc3d775db7154a464d45e7a2203ee7b2
                                                                                                                                                                                                                                            • Instruction ID: 76e950fc517d326a126ad6d4ba2887cbe8280b2359fa1bcecc8b89633475a5ee
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 71d70a3cd8a9c92333c316fe91c99806dc3d775db7154a464d45e7a2203ee7b2
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: AE32C330608342EFDB28CF24DC84BAAB7E1FF85308F14A55EE655A7291D771E844DB92

                                                                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00E42D07
                                                                                                                                                                                                                                            • RegisterClassExW.USER32(00000030), ref: 00E42D31
                                                                                                                                                                                                                                            • RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E42D42
                                                                                                                                                                                                                                            • InitCommonControlsEx.COMCTL32(?), ref: 00E42D5F
                                                                                                                                                                                                                                            • ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E42D6F
                                                                                                                                                                                                                                            • LoadIconW.USER32(000000A9), ref: 00E42D85
                                                                                                                                                                                                                                            • ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E42D94
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: IconImageList_Register$BrushClassColorCommonControlsCreateInitLoadMessageReplaceWindow
                                                                                                                                                                                                                                            • String ID: +$0$AutoIt v3 GUI$TaskbarCreated
                                                                                                                                                                                                                                            • API String ID: 2914291525-1005189915
                                                                                                                                                                                                                                            • Opcode ID: e3eca67da570ad60c6a6598418e2ae9f57f3b6c9952d7a7486d496ab682d46b0
                                                                                                                                                                                                                                            • Instruction ID: 9e39ca80f39dd0b3fcf4dccf48b19d012682b3a6d84ee8955da06bb7fa249718
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: e3eca67da570ad60c6a6598418e2ae9f57f3b6c9952d7a7486d496ab682d46b0
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C221B2B590221DAFDB00DFA5E849BDDBBB8FB08741F10811BE621B62A0D7B14544DF91

                                                                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                                                                            • Executed
                                                                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                                                                            control_flow_graph 447 e8065b-e8068b call e8042f 450 e8068d-e80698 call e6f2c6 447->450 451 e806a6-e806b2 call e75221 447->451 456 e8069a-e806a1 call e6f2d9 450->456 457 e806cb-e80714 call e8039a 451->457 458 e806b4-e806c9 call e6f2c6 call e6f2d9 451->458 467 e8097d-e80983 456->467 465 e80781-e8078a GetFileType 457->465 466 e80716-e8071f 457->466 458->456 472 e8078c-e807bd GetLastError call e6f2a3 CloseHandle 465->472 473 e807d3-e807d6 465->473 470 e80721-e80725 466->470 471 e80756-e8077c GetLastError call e6f2a3 466->471 470->471 476 e80727-e80754 call e8039a 470->476 471->456 472->456 484 e807c3-e807ce call e6f2d9 472->484 474 e807d8-e807dd 473->474 475 e807df-e807e5 473->475 479 e807e9-e80837 call e7516a 474->479 475->479 480 e807e7 475->480 476->465 476->471 490 e80839-e80845 call e805ab 479->490 491 e80847-e8086b call e8014d 479->491 480->479 484->456 490->491 498 e8086f-e80879 call e786ae 490->498 496 e8086d 491->496 497 e8087e-e808c1 491->497 496->498 500 e808e2-e808f0 497->500 501 e808c3-e808c7 497->501 498->467 504 e8097b 500->504 505 e808f6-e808fa 500->505 501->500 503 e808c9-e808dd 501->503 503->500 504->467 505->504 506 e808fc-e8092f CloseHandle call e8039a 505->506 509 e80931-e8095d GetLastError call e6f2a3 call e75333 506->509 510 e80963-e80977 506->510 509->510 510->504
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E8039A: CreateFileW.KERNELBASE(00000000,00000000,?,00E80704,?,?,00000000,?,00E80704,00000000,0000000C), ref: 00E803B7
                                                                                                                                                                                                                                            • GetLastError.KERNEL32 ref: 00E8076F
                                                                                                                                                                                                                                            • __dosmaperr.LIBCMT ref: 00E80776
                                                                                                                                                                                                                                            • GetFileType.KERNELBASE(00000000), ref: 00E80782
                                                                                                                                                                                                                                            • GetLastError.KERNEL32 ref: 00E8078C
                                                                                                                                                                                                                                            • __dosmaperr.LIBCMT ref: 00E80795
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00E807B5
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00E808FF
                                                                                                                                                                                                                                            • GetLastError.KERNEL32 ref: 00E80931
                                                                                                                                                                                                                                            • __dosmaperr.LIBCMT ref: 00E80938
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorLast__dosmaperr$CloseFileHandle$CreateType
                                                                                                                                                                                                                                            • String ID: H
                                                                                                                                                                                                                                            • API String ID: 4237864984-2852464175
                                                                                                                                                                                                                                            • Opcode ID: bb69f6e68918d2510af801f9492ac9b0690b822613d4545590ae60814c7113f8
                                                                                                                                                                                                                                            • Instruction ID: ae7644bbac790e77f938957f31d143e5fc07c5f795180ae25235f0550d80ef6d
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: bb69f6e68918d2510af801f9492ac9b0690b822613d4545590ae60814c7113f8
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: ACA12832A001088FDF19FF68D852BAD7BE0EB46324F14515AF819BB2A1DB319857DB91

                                                                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E43A5A: GetModuleFileNameW.KERNEL32(00000000,?,00007FFF,00F11418,?,00E42E7F,?,?,?,00000000), ref: 00E43A78
                                                                                                                                                                                                                                              • Part of subcall function 00E43357: GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00E43379
                                                                                                                                                                                                                                            • RegOpenKeyExW.KERNELBASE(80000001,Software\AutoIt v3\AutoIt,00000000,00000001,?,?,\Include\), ref: 00E4356A
                                                                                                                                                                                                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,00000000,?), ref: 00E8318D
                                                                                                                                                                                                                                            • RegQueryValueExW.ADVAPI32(?,Include,00000000,00000000,?,?,00000000), ref: 00E831CE
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 00E83210
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00E83277
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00E83286
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: NameQueryValue_wcslen$CloseFileFullModuleOpenPath
                                                                                                                                                                                                                                            • String ID: Include$Software\AutoIt v3\AutoIt$\$\Include\
                                                                                                                                                                                                                                            • API String ID: 98802146-2727554177
                                                                                                                                                                                                                                            • Opcode ID: 14e079fa1258ca63a565cfaf47d185dbcdb224e4794fb88a85bbee73ced8b0d7
                                                                                                                                                                                                                                            • Instruction ID: 57395be05b935978e8c3e4806856c8ef9ad9b418b38b557ed1ab86f643a0d5ec
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 14e079fa1258ca63a565cfaf47d185dbcdb224e4794fb88a85bbee73ced8b0d7
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: FA71D2714053059EC304EFA9EC8299BBBE8FF84740F41682EF559E31B1EB348A58DB52

                                                                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00E42B8E
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00E42B9D
                                                                                                                                                                                                                                            • LoadIconW.USER32(00000063), ref: 00E42BB3
                                                                                                                                                                                                                                            • LoadIconW.USER32(000000A4), ref: 00E42BC5
                                                                                                                                                                                                                                            • LoadIconW.USER32(000000A2), ref: 00E42BD7
                                                                                                                                                                                                                                            • LoadImageW.USER32(00000063,00000001,00000010,00000010,00000000), ref: 00E42BEF
                                                                                                                                                                                                                                            • RegisterClassExW.USER32(?), ref: 00E42C40
                                                                                                                                                                                                                                              • Part of subcall function 00E42CD4: GetSysColorBrush.USER32(0000000F), ref: 00E42D07
                                                                                                                                                                                                                                              • Part of subcall function 00E42CD4: RegisterClassExW.USER32(00000030), ref: 00E42D31
                                                                                                                                                                                                                                              • Part of subcall function 00E42CD4: RegisterWindowMessageW.USER32(TaskbarCreated), ref: 00E42D42
                                                                                                                                                                                                                                              • Part of subcall function 00E42CD4: InitCommonControlsEx.COMCTL32(?), ref: 00E42D5F
                                                                                                                                                                                                                                              • Part of subcall function 00E42CD4: ImageList_Create.COMCTL32(00000010,00000010,00000021,00000001,00000001), ref: 00E42D6F
                                                                                                                                                                                                                                              • Part of subcall function 00E42CD4: LoadIconW.USER32(000000A9), ref: 00E42D85
                                                                                                                                                                                                                                              • Part of subcall function 00E42CD4: ImageList_ReplaceIcon.COMCTL32(000000FF,00000000), ref: 00E42D94
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Load$Icon$ImageRegister$BrushClassColorList_$CommonControlsCreateCursorInitMessageReplaceWindow
                                                                                                                                                                                                                                            • String ID: #$0$AutoIt v3
                                                                                                                                                                                                                                            • API String ID: 423443420-4155596026
                                                                                                                                                                                                                                            • Opcode ID: 0b06074dbe8a0b1bb6dff4812a178da5b4f906c99f0348c7573943ad9342f674
                                                                                                                                                                                                                                            • Instruction ID: a8e15f0da920cc09ad9ab405f9d24cefa9c2440b6be9bc3cc87eaad3762d1764
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 0b06074dbe8a0b1bb6dff4812a178da5b4f906c99f0348c7573943ad9342f674
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: AD212C70E02318AFDB109FA6EC55ADABFB4FB48B50F11801BF610B66A4D7B11554EF90

                                                                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                                                                            • Executed
                                                                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                                                                            control_flow_graph 588 e43170-e43185 589 e431e5-e431e7 588->589 590 e43187-e4318a 588->590 589->590 593 e431e9 589->593 591 e4318c-e43193 590->591 592 e431eb 590->592 594 e43265-e4326d PostQuitMessage 591->594 595 e43199-e4319e 591->595 597 e82dfb-e82e23 call e418e2 call e5e499 592->597 598 e431f1-e431f6 592->598 596 e431d0-e431d8 DefWindowProcW 593->596 603 e43219-e4321b 594->603 600 e431a4-e431a8 595->600 601 e82e7c-e82e90 call eabf30 595->601 602 e431de-e431e4 596->602 632 e82e28-e82e2f 597->632 604 e4321d-e43244 SetTimer RegisterWindowMessageW 598->604 605 e431f8-e431fb 598->605 607 e82e68-e82e72 call eac161 600->607 608 e431ae-e431b3 600->608 601->603 626 e82e96 601->626 603->602 604->603 609 e43246-e43251 CreatePopupMenu 604->609 611 e82d9c-e82d9f 605->611 612 e43201-e4320f KillTimer call e430f2 605->612 622 e82e77 607->622 615 e82e4d-e82e54 608->615 616 e431b9-e431be 608->616 609->603 618 e82da1-e82da5 611->618 619 e82dd7-e82df6 MoveWindow 611->619 621 e43214 call e43c50 612->621 615->596 629 e82e5a-e82e63 call ea0ad7 615->629 624 e431c4-e431ca 616->624 625 e43253-e43263 call e4326f 616->625 627 e82dc6-e82dd2 SetFocus 618->627 628 e82da7-e82daa 618->628 619->603 621->603 622->603 624->596 624->632 625->603 626->596 627->603 628->624 633 e82db0-e82dc1 call e418e2 628->633 629->596 632->596 637 e82e35-e82e48 call e430f2 call e43837 632->637 633->603 637->596
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • DefWindowProcW.USER32(?,?,?,?,?,?,?,?,?,00E4316A,?,?), ref: 00E431D8
                                                                                                                                                                                                                                            • KillTimer.USER32(?,00000001,?,?,?,?,?,00E4316A,?,?), ref: 00E43204
                                                                                                                                                                                                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00E43227
                                                                                                                                                                                                                                            • RegisterWindowMessageW.USER32(TaskbarCreated,?,?,?,?,?,00E4316A,?,?), ref: 00E43232
                                                                                                                                                                                                                                            • CreatePopupMenu.USER32 ref: 00E43246
                                                                                                                                                                                                                                            • PostQuitMessage.USER32(00000000), ref: 00E43267
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageTimerWindow$CreateKillMenuPopupPostProcQuitRegister
                                                                                                                                                                                                                                            • String ID: TaskbarCreated
                                                                                                                                                                                                                                            • API String ID: 129472671-2362178303
                                                                                                                                                                                                                                            • Opcode ID: f7c228720415c08cf19b2f9c5632b89c4a202a4f937433db8c9d84fd3e5b4f78
                                                                                                                                                                                                                                            • Instruction ID: 2a377c38c5a62043a303c5bc28dd601c09dcf0c99326e1c8e4def471f4382e36
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f7c228720415c08cf19b2f9c5632b89c4a202a4f937433db8c9d84fd3e5b4f78
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D6417B30200208ABDF142B78BC1DBF93B59F705348F14711AFA1AB62E2C7B1AB40E765

                                                                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                                                                            • Executed
                                                                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                                                                            control_flow_graph 644 e41410-e41449 645 e824b8-e824b9 DestroyWindow 644->645 646 e4144f-e41465 mciSendStringW 644->646 649 e824c4-e824d1 645->649 647 e416c6-e416d3 646->647 648 e4146b-e41473 646->648 651 e416d5-e416f0 UnregisterHotKey 647->651 652 e416f8-e416ff 647->652 648->649 650 e41479-e41488 call e4182e 648->650 656 e82500-e82507 649->656 657 e824d3-e824d6 649->657 664 e8250e-e8251a 650->664 665 e4148e-e41496 650->665 651->652 654 e416f2-e416f3 call e410d0 651->654 652->648 655 e41705 652->655 654->652 655->647 656->649 660 e82509 656->660 661 e824d8-e824e0 call e46246 657->661 662 e824e2-e824e5 FindClose 657->662 660->664 666 e824eb-e824f8 661->666 662->666 671 e8251c-e8251e FreeLibrary 664->671 672 e82524-e8252b 664->672 668 e4149c-e414c1 call e4cfa0 665->668 669 e82532-e8253f 665->669 666->656 670 e824fa-e824fb call eb32b1 666->670 682 e414c3 668->682 683 e414f8-e41503 CoUninitialize 668->683 676 e82541-e8255e VirtualFree 669->676 677 e82566-e8256d 669->677 670->656 671->672 672->664 675 e8252d 672->675 675->669 676->677 678 e82560-e82561 call eb3317 676->678 677->669 679 e8256f 677->679 678->677 684 e82574-e82578 679->684 685 e414c6-e414f6 call e41a05 call e419ae 682->685 683->684 686 e41509-e4150e 683->686 684->686 687 e8257e-e82584 684->687 685->683 689 e41514-e4151e 686->689 690 e82589-e82596 call eb32eb 686->690 687->686 691 e41524-e415a5 call e4988f call e41944 call e417d5 call e5fe14 call e4177c call e4988f call e4cfa0 call e417fe call e5fe14 689->691 692 e41707-e41714 call e5f80e 689->692 703 e82598 690->703 707 e8259d-e825bf call e5fdcd 691->707 733 e415ab-e415cf call e5fe14 691->733 692->691 705 e4171a 692->705 703->707 705->692 712 e825c1 707->712 715 e825c6-e825e8 call e5fdcd 712->715 721 e825ea 715->721 724 e825ef-e82611 call e5fdcd 721->724 731 e82613 724->731 734 e82618-e82625 call ea64d4 731->734 733->715 740 e415d5-e415f9 call e5fe14 733->740 739 e82627 734->739 742 e8262c-e82639 call e5ac64 739->742 740->724 745 e415ff-e41619 call e5fe14 740->745 748 e8263b 742->748 745->734 750 e4161f-e41643 call e417d5 call e5fe14 745->750 751 e82640-e8264d call eb3245 748->751 750->742 759 e41649-e41651 750->759 758 e8264f 751->758 761 e82654-e82661 call eb32cc 758->761 759->751 760 e41657-e41675 call e4988f call e4190a 759->760 760->761 770 e4167b-e41689 760->770 767 e82663 761->767 769 e82668-e82675 call eb32cc 767->769 775 e82677 769->775 770->769 772 e4168f-e416c5 call e4988f * 3 call e41876 770->772 775->775
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • mciSendStringW.WINMM(close all,00000000,00000000,00000000), ref: 00E41459
                                                                                                                                                                                                                                            • CoUninitialize.COMBASE ref: 00E414F8
                                                                                                                                                                                                                                            • UnregisterHotKey.USER32(?), ref: 00E416DD
                                                                                                                                                                                                                                            • DestroyWindow.USER32(?), ref: 00E824B9
                                                                                                                                                                                                                                            • FreeLibrary.KERNEL32(?), ref: 00E8251E
                                                                                                                                                                                                                                            • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00E8254B
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Free$DestroyLibrarySendStringUninitializeUnregisterVirtualWindow
                                                                                                                                                                                                                                            • String ID: close all
                                                                                                                                                                                                                                            • API String ID: 469580280-3243417748
                                                                                                                                                                                                                                            • Opcode ID: 513f480cfa241c41db9ef6163e403730fa4291f942aba920b6ec81b4b012450e
                                                                                                                                                                                                                                            • Instruction ID: 247d0ed9c3b6ab31c48383703fe400d250eeeb04436db2860942dca53c3ab03f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 513f480cfa241c41db9ef6163e403730fa4291f942aba920b6ec81b4b012450e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 66D18A307012128FCB19EF15E499A69F7A0BF05304F2462AEE94E7B262DB30EC52CF51

                                                                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                                                                            • Executed
                                                                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                                                                            control_flow_graph 793 e42c63-e42cd3 CreateWindowExW * 2 ShowWindow * 2
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CreateWindowExW.USER32(00000000,AutoIt v3,AutoIt v3,00CF0000,80000000,80000000,0000012C,00000064,00000000,00000000,00000000,00000001), ref: 00E42C91
                                                                                                                                                                                                                                            • CreateWindowExW.USER32(00000000,edit,00000000,50B008C4,00000000,00000000,00000000,00000000,00000000,00000001,00000000), ref: 00E42CB2
                                                                                                                                                                                                                                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,00E41CAD,?), ref: 00E42CC6
                                                                                                                                                                                                                                            • ShowWindow.USER32(00000000,?,?,?,?,?,?,00E41CAD,?), ref: 00E42CCF
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$CreateShow
                                                                                                                                                                                                                                            • String ID: AutoIt v3$edit
                                                                                                                                                                                                                                            • API String ID: 1584632944-3779509399
                                                                                                                                                                                                                                            • Opcode ID: edabfae8857b9f2b0d488673203de7f344c6027160587d23f67ca3b683416563
                                                                                                                                                                                                                                            • Instruction ID: bc9f3359cccb8720cea0bde07ff5bc6fc13a9419a90f451349e5538d3cdab25a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: edabfae8857b9f2b0d488673203de7f344c6027160587d23f67ca3b683416563
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: FBF030755402947AEB3007236C08EB77E7DE7C6F50F11411AFA10A2164C2620841EE70

                                                                                                                                                                                                                                            Control-flow Graph

                                                                                                                                                                                                                                            • Executed
                                                                                                                                                                                                                                            • Not Executed
                                                                                                                                                                                                                                            control_flow_graph 950 e43b1c-e43b27 951 e43b99-e43b9b 950->951 952 e43b29-e43b2e 950->952 954 e43b8c-e43b8f 951->954 952->951 953 e43b30-e43b48 RegOpenKeyExW 952->953 953->951 955 e43b4a-e43b69 RegQueryValueExW 953->955 956 e43b80-e43b8b RegCloseKey 955->956 957 e43b6b-e43b76 955->957 956->954 958 e43b90-e43b97 957->958 959 e43b78-e43b7a 957->959 960 e43b7e 958->960 959->960 960->956
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • RegOpenKeyExW.KERNELBASE(80000001,Control Panel\Mouse,00000000,00000001,00000000,?,?,80000001,80000001,?,00E43B0F,SwapMouseButtons,00000004,?), ref: 00E43B40
                                                                                                                                                                                                                                            • RegQueryValueExW.KERNELBASE(00000000,00000000,00000000,00000000,?,?,?,?,?,80000001,80000001,?,00E43B0F,SwapMouseButtons,00000004,?), ref: 00E43B61
                                                                                                                                                                                                                                            • RegCloseKey.KERNELBASE(00000000,?,?,?,80000001,80000001,?,00E43B0F,SwapMouseButtons,00000004,?), ref: 00E43B83
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CloseOpenQueryValue
                                                                                                                                                                                                                                            • String ID: Control Panel\Mouse
                                                                                                                                                                                                                                            • API String ID: 3677997916-824357125
                                                                                                                                                                                                                                            • Opcode ID: 482f5a63ae74c4e05fc42eeb24220e8eb646d3054667ce40dfdb7971b4ba7af5
                                                                                                                                                                                                                                            • Instruction ID: 5517fabbf46f0f47191e03271727cad77295ae5b31aeaf5da3a64507aa719665
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 482f5a63ae74c4e05fc42eeb24220e8eb646d3054667ce40dfdb7971b4ba7af5
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: DD112AB5511208FFDB218FA5EC44AEEB7B9EF04784B10955AA805E7110D2319E449760
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • TranslateMessage.USER32(?), ref: 00E4DB7B
                                                                                                                                                                                                                                            • DispatchMessageW.USER32(?), ref: 00E4DB89
                                                                                                                                                                                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E4DB9F
                                                                                                                                                                                                                                            • Sleep.KERNELBASE(0000000A), ref: 00E4DBB1
                                                                                                                                                                                                                                            • TranslateAcceleratorW.USER32(?,?,?), ref: 00E91CC9
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3288985973-0
                                                                                                                                                                                                                                            • Opcode ID: 8a911fc0d3e61309f5eb53332e4e2913e90dbdadb7b827d3cd66c69e4917c062
                                                                                                                                                                                                                                            • Instruction ID: a74cc014d6c2a22aecac5791dfb7e83dd9590c4e05a70ac71644eb66446a58ca
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 8a911fc0d3e61309f5eb53332e4e2913e90dbdadb7b827d3cd66c69e4917c062
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 3411CE307093469FEB38CB31EC98FA677A8EF45354F24555AE609A7091DB30E848DB15
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • LoadStringW.USER32(00000065,?,0000007F,00000104), ref: 00E833A2
                                                                                                                                                                                                                                              • Part of subcall function 00E46B57: _wcslen.LIBCMT ref: 00E46B6A
                                                                                                                                                                                                                                            • Shell_NotifyIconW.SHELL32(00000001,?), ref: 00E43A04
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: IconLoadNotifyShell_String_wcslen
                                                                                                                                                                                                                                            • String ID: Line:
                                                                                                                                                                                                                                            • API String ID: 2289894680-1585850449
                                                                                                                                                                                                                                            • Opcode ID: a96ac457dfc14454d95d99943f3e3c8f054f91143dc13c2dbac5be00cae7abc7
                                                                                                                                                                                                                                            • Instruction ID: 43b4c6c5b228ffa32a6016c4ecd1b9286e2b3a41a406593a17c48e6c3f224d0b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a96ac457dfc14454d95d99943f3e3c8f054f91143dc13c2dbac5be00cae7abc7
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: CB31C371448304AAD725EB30EC45BEBB7E8AF85714F10692AF6A9A21D1DB709648C7C3
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00E60668
                                                                                                                                                                                                                                              • Part of subcall function 00E632A4: RaiseException.KERNEL32(?,?,?,00E6068A,?,00F11444,?,?,?,?,?,?,00E6068A,00E41129,00F08738,00E41129), ref: 00E63304
                                                                                                                                                                                                                                            • __CxxThrowException@8.LIBVCRUNTIME ref: 00E60685
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Exception@8Throw$ExceptionRaise
                                                                                                                                                                                                                                            • String ID: Unknown exception
                                                                                                                                                                                                                                            • API String ID: 3476068407-410509341
                                                                                                                                                                                                                                            • Opcode ID: cafce3833986718dd43bc58f3fbebe3f278bc835fd5e654393d9dc41be1dcee0
                                                                                                                                                                                                                                            • Instruction ID: 9585e581713404c449f4be6c813168585c34981d32777ec502192bf1911aa1d0
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: cafce3833986718dd43bc58f3fbebe3f278bc835fd5e654393d9dc41be1dcee0
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 6BF0C23498020D77CB00BAB4FC56D9E77BC5E403D4B606531F914B69E2EF71DA6AC681
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E41BC3: MapVirtualKeyW.USER32(0000005B,00000000), ref: 00E41BF4
                                                                                                                                                                                                                                              • Part of subcall function 00E41BC3: MapVirtualKeyW.USER32(00000010,00000000), ref: 00E41BFC
                                                                                                                                                                                                                                              • Part of subcall function 00E41BC3: MapVirtualKeyW.USER32(000000A0,00000000), ref: 00E41C07
                                                                                                                                                                                                                                              • Part of subcall function 00E41BC3: MapVirtualKeyW.USER32(000000A1,00000000), ref: 00E41C12
                                                                                                                                                                                                                                              • Part of subcall function 00E41BC3: MapVirtualKeyW.USER32(00000011,00000000), ref: 00E41C1A
                                                                                                                                                                                                                                              • Part of subcall function 00E41BC3: MapVirtualKeyW.USER32(00000012,00000000), ref: 00E41C22
                                                                                                                                                                                                                                              • Part of subcall function 00E41B4A: RegisterWindowMessageW.USER32(00000004,?,00E412C4), ref: 00E41BA2
                                                                                                                                                                                                                                            • GetStdHandle.KERNEL32(000000F6,00000000,00000000), ref: 00E4136A
                                                                                                                                                                                                                                            • OleInitialize.OLE32 ref: 00E41388
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000,00000000), ref: 00E824AB
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Virtual$Handle$CloseInitializeMessageRegisterWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1986988660-0
                                                                                                                                                                                                                                            • Opcode ID: 51fdbf469deb4705ee23785a84b54887528a7636cd9c92a4c6d61db35956947d
                                                                                                                                                                                                                                            • Instruction ID: e58b9c5764e5d69171d959777851b6670a220d84d5ebc0884d94e53f86604e78
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 51fdbf469deb4705ee23785a84b54887528a7636cd9c92a4c6d61db35956947d
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: A471BBB49122098EC784DF7ABD556D53AE2FBC939431AD22ED30AE7362EB304445EF44
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E43923: Shell_NotifyIconW.SHELL32(00000001,?), ref: 00E43A04
                                                                                                                                                                                                                                            • Shell_NotifyIconW.SHELL32(00000001,000003A8), ref: 00EAC259
                                                                                                                                                                                                                                            • KillTimer.USER32(?,00000001,?,?), ref: 00EAC261
                                                                                                                                                                                                                                            • SetTimer.USER32(?,00000001,000002EE,00000000), ref: 00EAC270
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: IconNotifyShell_Timer$Kill
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3500052701-0
                                                                                                                                                                                                                                            • Opcode ID: cbd2ff1097e30652fa87f7aa99cd8e4ab7a7d8e1f38dc78b8bf987a221fe8734
                                                                                                                                                                                                                                            • Instruction ID: b565689ebf197cf5257d92185ecabf813d0052e54c4c772ddfbd0071801f4037
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: cbd2ff1097e30652fa87f7aa99cd8e4ab7a7d8e1f38dc78b8bf987a221fe8734
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2831C8709047446FEB328F7498557E7BBEC9B1B308F10149ED2DAB7251D3746A84CB51
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CloseHandle.KERNELBASE(00000000,00000000,?,?,00E785CC,?,00F08CC8,0000000C), ref: 00E78704
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(?,00E785CC,?,00F08CC8,0000000C), ref: 00E7870E
                                                                                                                                                                                                                                            • __dosmaperr.LIBCMT ref: 00E78739
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CloseErrorHandleLast__dosmaperr
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2583163307-0
                                                                                                                                                                                                                                            • Opcode ID: c5426aafde7d1d654531b9aab214a32cd39bbbf51854d5e806b63d8a3c519b17
                                                                                                                                                                                                                                            • Instruction ID: fe38efb050363c26f1b2fad7727bbeae81b59a9e53679cfb4daf2084a1714933
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: c5426aafde7d1d654531b9aab214a32cd39bbbf51854d5e806b63d8a3c519b17
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 31016F33A4512036D62462746A4E77E27868BA177CF35E11AF80CFB0E2DEE08C818650
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • TranslateMessage.USER32(?), ref: 00E4DB7B
                                                                                                                                                                                                                                            • DispatchMessageW.USER32(?), ref: 00E4DB89
                                                                                                                                                                                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00E4DB9F
                                                                                                                                                                                                                                            • Sleep.KERNELBASE(0000000A), ref: 00E4DBB1
                                                                                                                                                                                                                                            • TranslateAcceleratorW.USER32(?,?,?), ref: 00E91CC9
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Message$Translate$AcceleratorDispatchPeekSleep
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3288985973-0
                                                                                                                                                                                                                                            • Opcode ID: 781447b9b8672ff799139672fc3787231982218bd4c0d38cfd7c09c9f81eae0e
                                                                                                                                                                                                                                            • Instruction ID: 1cb1354de8ce03664900e8ff5a34b0bd74cdd4c7ac35afbd30605cde66bae923
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 781447b9b8672ff799139672fc3787231982218bd4c0d38cfd7c09c9f81eae0e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D5F05E306093459BEB34CB71AC49FEA73A8EB44354F105A1AE61AA30C0DB30A488DB15
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • __Init_thread_footer.LIBCMT ref: 00E517F6
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Init_thread_footer
                                                                                                                                                                                                                                            • String ID: CALL
                                                                                                                                                                                                                                            • API String ID: 1385522511-4196123274
                                                                                                                                                                                                                                            • Opcode ID: 28125f3a1f97cb9cad72ffd6336790008a00930e158f4e80073e8b742a080486
                                                                                                                                                                                                                                            • Instruction ID: d893a3b025ce0fca4bc95f69c8c699fda6fef6558946729a3cc167d1fae87b6f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 28125f3a1f97cb9cad72ffd6336790008a00930e158f4e80073e8b742a080486
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C922AD706083019FC714DF14C481B6ABBF1BF89315F14A99EF896AB362D771E949CB42
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetOpenFileNameW.COMDLG32(?), ref: 00E82C8C
                                                                                                                                                                                                                                              • Part of subcall function 00E43AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E43A97,?,?,00E42E7F,?,?,?,00000000), ref: 00E43AC2
                                                                                                                                                                                                                                              • Part of subcall function 00E42DA5: GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00E42DC4
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Name$Path$FileFullLongOpen
                                                                                                                                                                                                                                            • String ID: X
                                                                                                                                                                                                                                            • API String ID: 779396738-3081909835
                                                                                                                                                                                                                                            • Opcode ID: 5bd599c2ef7b0e7f46c24ab7bdd5236930f9410afb4e9d29cfc7ff0546909ece
                                                                                                                                                                                                                                            • Instruction ID: 479c6942daa0bfd4bce743bbbd05c64fa646392d567b3b362ad9662845bf41e6
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 5bd599c2ef7b0e7f46c24ab7bdd5236930f9410afb4e9d29cfc7ff0546909ece
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4921C370A002589FCB01EF94D805BEE7BFCAF48304F009059E609F7281DBB45A49DF61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E43908
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: IconNotifyShell_
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1144537725-0
                                                                                                                                                                                                                                            • Opcode ID: 5e459d0d0f37339c4f2d273174cde342222baad201c1b8ac0134cfba8646a7ff
                                                                                                                                                                                                                                            • Instruction ID: 97716a7d7ecfe5a41ad2f6397fcda4e834f256add515142c2c3789f4a56eba31
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 5e459d0d0f37339c4f2d273174cde342222baad201c1b8ac0134cfba8646a7ff
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 8831A0B05043058FD720DF34E8857D7BBE4FB49708F00092EF6A9A3280E771AA44DB52
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: SleepTimetime
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 346578373-0
                                                                                                                                                                                                                                            • Opcode ID: 2ebc87946d56c8d6cee828d83202251049b40ee008cdc3cf8dee9e41702418f0
                                                                                                                                                                                                                                            • Instruction ID: f0faeba70962be637255110641c31ebaa8c76b4cfa6ad4752cf50143707e94b8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 2ebc87946d56c8d6cee828d83202251049b40ee008cdc3cf8dee9e41702418f0
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2DF08C31240205AFD310EF79E949BAAB7E9EF85761F00012AE85DE72A0DB70A804CB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E44E90: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00E44EDD,?,00F11418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E44E9C
                                                                                                                                                                                                                                              • Part of subcall function 00E44E90: GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E44EAE
                                                                                                                                                                                                                                              • Part of subcall function 00E44E90: FreeLibrary.KERNEL32(00000000,?,?,00E44EDD,?,00F11418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E44EC0
                                                                                                                                                                                                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000002,?,00F11418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E44EFD
                                                                                                                                                                                                                                              • Part of subcall function 00E44E59: LoadLibraryA.KERNEL32(kernel32.dll,?,?,00E83CDE,?,00F11418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E44E62
                                                                                                                                                                                                                                              • Part of subcall function 00E44E59: GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E44E74
                                                                                                                                                                                                                                              • Part of subcall function 00E44E59: FreeLibrary.KERNEL32(00000000,?,?,00E83CDE,?,00F11418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E44E87
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Library$Load$AddressFreeProc
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2632591731-0
                                                                                                                                                                                                                                            • Opcode ID: 442ea5f61fdbaba31b078ba22307fa562a33ca5ef54573cbd2eadd6ad604f9eb
                                                                                                                                                                                                                                            • Instruction ID: 4f4df9f8cf0b26c3a6d5e97de7540f9d8fc96c9bf4e56092e095eb4d8d772e3b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 442ea5f61fdbaba31b078ba22307fa562a33ca5ef54573cbd2eadd6ad604f9eb
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C811E372700305ABCB14BF70EC02FAD77E5AF40B10F20A42EF546BA1D1EE709A499760
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: __wsopen_s
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3347428461-0
                                                                                                                                                                                                                                            • Opcode ID: 785d40759ffc415f27517d2d27ed70a453b7496a4c38f8259153bead06069ea0
                                                                                                                                                                                                                                            • Instruction ID: fcb06b9c71d9d634afeaba011a716eba10c105f2fa87694d93f40e85cb711ea8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 785d40759ffc415f27517d2d27ed70a453b7496a4c38f8259153bead06069ea0
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 6F11487190410AAFCB05DF58E9449DE7BF4EF48314F108059F818AB312EA70DA11CBA4
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E74C7D: RtlAllocateHeap.NTDLL(00000008,00E41129,00000000,?,00E72E29,00000001,00000364,?,?,?,00E6F2DE,00E73863,00F11444,?,00E5FDF5,?), ref: 00E74CBE
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7506C
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: AllocateHeap_free
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 614378929-0
                                                                                                                                                                                                                                            • Opcode ID: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                                            • Instruction ID: c2d0bff0180f7b1879258287233cc13a5a835d79b891e683464194a5c5254960
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9ba45ce058d1080761d5af908226540236078fd1fc19e2e0238d0ad147f07c6e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 5C012B732047045BE3218E65984195AFBE8FB85370F25451DE198A32C0E6706D05C774
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                                            • Instruction ID: b8eb17cdf11a3998efc85cafae312c082b743952add054f68e96690837f246e0
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: d6c69ec2a70ac845cc05b5f137181c3f07394ab8b33ef369e8c7ef627d5c9574
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C4F02D36550A1496D7313A75FD05B9E33D89F623B4F105715F525B33D2CB70D80186A6
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • RtlAllocateHeap.NTDLL(00000008,00E41129,00000000,?,00E72E29,00000001,00000364,?,?,?,00E6F2DE,00E73863,00F11444,?,00E5FDF5,?), ref: 00E74CBE
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: AllocateHeap
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1279760036-0
                                                                                                                                                                                                                                            • Opcode ID: 4815d78b99e4ce387eea17c277b3fc820d4131170b5b9c9076ce4f18075874fb
                                                                                                                                                                                                                                            • Instruction ID: fca9cdfb165727252f2019861ed268af999c6c28bfa6431f6343c3dddc3a2784
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 4815d78b99e4ce387eea17c277b3fc820d4131170b5b9c9076ce4f18075874fb
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 3EF0B4B1643224A6FB225F62AC05F9AB7C8BF417A4B1DE111F91DBA1D4CB31DC0086A0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • RtlAllocateHeap.NTDLL(00000000,?,00F11444,?,00E5FDF5,?,?,00E4A976,00000010,00F11440,00E413FC,?,00E413C6,?,00E41129), ref: 00E73852
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: AllocateHeap
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1279760036-0
                                                                                                                                                                                                                                            • Opcode ID: a20f1b2574c87ba4c12b7482f5c2291f7297ea8a2e0b797283ebaddd8ba1f43e
                                                                                                                                                                                                                                            • Instruction ID: 3547a153486c303656d93628c8176f9e39d9081420111704cf2ff213a7d929b7
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a20f1b2574c87ba4c12b7482f5c2291f7297ea8a2e0b797283ebaddd8ba1f43e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 84E0E53114122596F7652A77AC00FDA77C8AB427F4F15A222FC1CB65D1CB31DD01B1E2
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • FreeLibrary.KERNEL32(?,?,00F11418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E44F6D
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: FreeLibrary
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3664257935-0
                                                                                                                                                                                                                                            • Opcode ID: 3be04341adf3a91d5908e7c70b5dccd9b838bf974b5b6f6b5d9c7d2f8b10e4fa
                                                                                                                                                                                                                                            • Instruction ID: 3994a81bfbef88181a77ed0fd30d60e33ae119a3d2ef9d24ff20c51410ebbd5d
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 3be04341adf3a91d5908e7c70b5dccd9b838bf974b5b6f6b5d9c7d2f8b10e4fa
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 1DF01CB1305752CFDB349F65E490956BBE4BF14319320A96EE1EAA2661C7319848DB10
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • IsWindow.USER32(00000000), ref: 00ED2A66
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2353593579-0
                                                                                                                                                                                                                                            • Opcode ID: 191acbc46c6a0fdcb81326b128f106aed68760c44e8a6b40ac09429ca2e368c6
                                                                                                                                                                                                                                            • Instruction ID: e6074a4a3887614c7753e4b04bb596f03e024152685cabbff96e80dc6cb55ae5
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 191acbc46c6a0fdcb81326b128f106aed68760c44e8a6b40ac09429ca2e368c6
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 08E048753511166EC714EA30DC804FA779CDBA5395710653BBD16E6240EB30D95686A0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • Shell_NotifyIconW.SHELL32(00000002,?), ref: 00E4314E
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: IconNotifyShell_
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1144537725-0
                                                                                                                                                                                                                                            • Opcode ID: ede20d7b232b2d836c80d5efc572748c668ac1c0f6c12c73c5c0d2d5eb72899f
                                                                                                                                                                                                                                            • Instruction ID: a444c53e8b0775b1975e9b336aa03f3925cda7a1081d6ea88f06efb32f84cca2
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ede20d7b232b2d836c80d5efc572748c668ac1c0f6c12c73c5c0d2d5eb72899f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 84F0A7709003189FE7529B24EC457D57BFCB70170CF0001E9A258A6285D7704788CF41
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetLongPathNameW.KERNELBASE(?,?,00007FFF), ref: 00E42DC4
                                                                                                                                                                                                                                              • Part of subcall function 00E46B57: _wcslen.LIBCMT ref: 00E46B6A
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: LongNamePath_wcslen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 541455249-0
                                                                                                                                                                                                                                            • Opcode ID: dc92a20e526c2ffd96f79b954a9db1c8ea828be7a2f0a84051adcd204d507ef4
                                                                                                                                                                                                                                            • Instruction ID: 0f6aab4bb52d6e418fb3a2038ac1802b8bad07b481293cb54be9f4b3cdabcc46
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: dc92a20e526c2ffd96f79b954a9db1c8ea828be7a2f0a84051adcd204d507ef4
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 41E0CD726001245BCB10A2989C05FDA77DDDFC87D4F0400B1FD0DF7258D960AD84C651
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E43837: Shell_NotifyIconW.SHELL32(00000000,?), ref: 00E43908
                                                                                                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00E42B6B
                                                                                                                                                                                                                                              • Part of subcall function 00E430F2: Shell_NotifyIconW.SHELL32(00000002,?), ref: 00E4314E
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: IconNotifyShell_$CurrentDirectory
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2619246295-0
                                                                                                                                                                                                                                            • Opcode ID: fa13e4e472819d2d117e340dadee8405431e3b3bae061751f4f34acc4fcf018e
                                                                                                                                                                                                                                            • Instruction ID: 94d0a414e82a376f021ee5de6dbc68a3af64f4afdb28bd39b9eb9f9d4b724872
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: fa13e4e472819d2d117e340dadee8405431e3b3bae061751f4f34acc4fcf018e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: BEE0862170424407CA08FB75B8565AEF7D9DBD6755F40353EF242B31A3CE6545898251
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CreateFileW.KERNELBASE(00000000,00000000,?,00E80704,?,?,00000000,?,00E80704,00000000,0000000C), ref: 00E803B7
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CreateFile
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 823142352-0
                                                                                                                                                                                                                                            • Opcode ID: 57fe7a093191346b065deb32a9d46b88e368fb7e519e9ccde43dc136fc9be68c
                                                                                                                                                                                                                                            • Instruction ID: 0cd696c910461c659d4f3299ca304a64bde9ea4b0f3ab533817766873ecb6ea3
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 57fe7a093191346b065deb32a9d46b88e368fb7e519e9ccde43dc136fc9be68c
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: A6D06C3204010DBFDF028F85ED06EDA3BAAFB48754F114000BE5866020C732E821EB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SystemParametersInfoW.USER32(00002001,00000000,00000002), ref: 00E41CBC
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: InfoParametersSystem
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3098949447-0
                                                                                                                                                                                                                                            • Opcode ID: 14126ab6f435094387aa61801611db27ac7f5b5f48c5f88553938393c23241a8
                                                                                                                                                                                                                                            • Instruction ID: df4ac21abf85d989e4da064012c141ae06923602e4601da8776efb3f329f56b7
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 14126ab6f435094387aa61801611db27ac7f5b5f48c5f88553938393c23241a8
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 8FC09236280309AFF6548BC0BC9AF907B65F34CB00F19C102F709A95E3C3A22820FA50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E59BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E59BB2
                                                                                                                                                                                                                                            • DefDlgProcW.USER32(?,0000004E,?,?,?,?,?,?), ref: 00ED961A
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00ED965B
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(FFFFFDD9,000000F0), ref: 00ED969F
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00ED96C9
                                                                                                                                                                                                                                            • SendMessageW.USER32 ref: 00ED96F2
                                                                                                                                                                                                                                            • GetKeyState.USER32(00000011), ref: 00ED978B
                                                                                                                                                                                                                                            • GetKeyState.USER32(00000009), ref: 00ED9798
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000130B,00000000,00000000), ref: 00ED97AE
                                                                                                                                                                                                                                            • GetKeyState.USER32(00000010), ref: 00ED97B8
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00ED97E9
                                                                                                                                                                                                                                            • SendMessageW.USER32 ref: 00ED9810
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001030,?,00ED7E95), ref: 00ED9918
                                                                                                                                                                                                                                            • ImageList_SetDragCursorImage.COMCTL32(00000000,00000000,00000000,?,?,?), ref: 00ED992E
                                                                                                                                                                                                                                            • ImageList_BeginDrag.COMCTL32(00000000,000000F8,000000F0), ref: 00ED9941
                                                                                                                                                                                                                                            • SetCapture.USER32(?), ref: 00ED994A
                                                                                                                                                                                                                                            • ClientToScreen.USER32(?,?), ref: 00ED99AF
                                                                                                                                                                                                                                            • ImageList_DragEnter.COMCTL32(00000000,?,?), ref: 00ED99BC
                                                                                                                                                                                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00ED99D6
                                                                                                                                                                                                                                            • ReleaseCapture.USER32 ref: 00ED99E1
                                                                                                                                                                                                                                            • GetCursorPos.USER32(?), ref: 00ED9A19
                                                                                                                                                                                                                                            • ScreenToClient.USER32(?,?), ref: 00ED9A26
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 00ED9A80
                                                                                                                                                                                                                                            • SendMessageW.USER32 ref: 00ED9AAE
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00ED9AEB
                                                                                                                                                                                                                                            • SendMessageW.USER32 ref: 00ED9B1A
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000110B,00000009,00000000), ref: 00ED9B3B
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000110B,00000009,?), ref: 00ED9B4A
                                                                                                                                                                                                                                            • GetCursorPos.USER32(?), ref: 00ED9B68
                                                                                                                                                                                                                                            • ScreenToClient.USER32(?,?), ref: 00ED9B75
                                                                                                                                                                                                                                            • GetParent.USER32(?), ref: 00ED9B93
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001012,00000000,?), ref: 00ED9BFA
                                                                                                                                                                                                                                            • SendMessageW.USER32 ref: 00ED9C2B
                                                                                                                                                                                                                                            • ClientToScreen.USER32(?,?), ref: 00ED9C84
                                                                                                                                                                                                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000), ref: 00ED9CB4
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001111,00000000,?), ref: 00ED9CDE
                                                                                                                                                                                                                                            • SendMessageW.USER32 ref: 00ED9D01
                                                                                                                                                                                                                                            • ClientToScreen.USER32(?,?), ref: 00ED9D4E
                                                                                                                                                                                                                                            • TrackPopupMenuEx.USER32(?,00000080,?,?,?,00000000), ref: 00ED9D82
                                                                                                                                                                                                                                              • Part of subcall function 00E59944: GetWindowLongW.USER32(?,000000EB), ref: 00E59952
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00ED9E05
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$ClientScreen$ImageLongWindow$CursorDragList_State$CaptureMenuPopupTrack$BeginEnterInvalidateParentProcRectRelease
                                                                                                                                                                                                                                            • String ID: @GUI_DRAGID$F
                                                                                                                                                                                                                                            • API String ID: 3429851547-4164748364
                                                                                                                                                                                                                                            • Opcode ID: 207390fbc2afa9d37b4d86a273268d274532e745d3c894ec26b229bd99d8083e
                                                                                                                                                                                                                                            • Instruction ID: 83f987b614e6fe54f260cbb7dc2243208a20a142dd237f77decb72b277ddbf0a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 207390fbc2afa9d37b4d86a273268d274532e745d3c894ec26b229bd99d8083e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 0A42BE30204201AFDB24CF24DC44AAABBE5FF48754F14561EF6A9A73E2D731E856DB42
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000408,00000000,00000000), ref: 00ED48F3
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000188,00000000,00000000), ref: 00ED4908
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,0000018A,00000000,00000000), ref: 00ED4927
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000148,00000000,00000000), ref: 00ED494B
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000147,00000000,00000000), ref: 00ED495C
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000149,00000000,00000000), ref: 00ED497B
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,0000130B,00000000,00000000), ref: 00ED49AE
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,0000133C,00000000,?), ref: 00ED49D4
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,0000110A,00000009,00000000), ref: 00ED4A0F
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00ED4A56
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,0000113E,00000000,00000004), ref: 00ED4A7E
                                                                                                                                                                                                                                            • IsMenu.USER32(?), ref: 00ED4A97
                                                                                                                                                                                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00ED4AF2
                                                                                                                                                                                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00ED4B20
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00ED4B94
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000113E,00000000,00000008), ref: 00ED4BE3
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00001001,00000000,?), ref: 00ED4C82
                                                                                                                                                                                                                                            • wsprintfW.USER32 ref: 00ED4CAE
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00ED4CC9
                                                                                                                                                                                                                                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 00ED4CF1
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,000000F0,00000000,00000000), ref: 00ED4D13
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00ED4D33
                                                                                                                                                                                                                                            • GetWindowTextW.USER32(?,00000000,00000001), ref: 00ED4D5A
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$MenuWindow$InfoItemText$Longwsprintf
                                                                                                                                                                                                                                            • String ID: %d/%02d/%02d
                                                                                                                                                                                                                                            • API String ID: 4054740463-328681919
                                                                                                                                                                                                                                            • Opcode ID: 7fa1935f85340abff339efba2ea70461463fc0bd51889f7f4519369696ee9c4b
                                                                                                                                                                                                                                            • Instruction ID: af28778781d3a616326c1c04e9c506d6ba6460255e01d6a67b849e187d9d32d6
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 7fa1935f85340abff339efba2ea70461463fc0bd51889f7f4519369696ee9c4b
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 331210B1600205AFEB248F25DC49FAE7BF8EF55714F10612AF915FA2E0DB749A42CB50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetForegroundWindow.USER32(00000000,00000000,00000000), ref: 00E5F998
                                                                                                                                                                                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00E9F474
                                                                                                                                                                                                                                            • IsIconic.USER32(00000000), ref: 00E9F47D
                                                                                                                                                                                                                                            • ShowWindow.USER32(00000000,00000009), ref: 00E9F48A
                                                                                                                                                                                                                                            • SetForegroundWindow.USER32(00000000), ref: 00E9F494
                                                                                                                                                                                                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00E9F4AA
                                                                                                                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00E9F4B1
                                                                                                                                                                                                                                            • GetWindowThreadProcessId.USER32(00000000,00000000), ref: 00E9F4BD
                                                                                                                                                                                                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 00E9F4CE
                                                                                                                                                                                                                                            • AttachThreadInput.USER32(?,00000000,00000001), ref: 00E9F4D6
                                                                                                                                                                                                                                            • AttachThreadInput.USER32(00000000,000000FF,00000001), ref: 00E9F4DE
                                                                                                                                                                                                                                            • SetForegroundWindow.USER32(00000000), ref: 00E9F4E1
                                                                                                                                                                                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E9F4F6
                                                                                                                                                                                                                                            • keybd_event.USER32(00000012,00000000), ref: 00E9F501
                                                                                                                                                                                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E9F50B
                                                                                                                                                                                                                                            • keybd_event.USER32(00000012,00000000), ref: 00E9F510
                                                                                                                                                                                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E9F519
                                                                                                                                                                                                                                            • keybd_event.USER32(00000012,00000000), ref: 00E9F51E
                                                                                                                                                                                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E9F528
                                                                                                                                                                                                                                            • keybd_event.USER32(00000012,00000000), ref: 00E9F52D
                                                                                                                                                                                                                                            • SetForegroundWindow.USER32(00000000), ref: 00E9F530
                                                                                                                                                                                                                                            • AttachThreadInput.USER32(?,000000FF,00000000), ref: 00E9F557
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$Thread$AttachForegroundInputVirtualkeybd_event$Process$CurrentFindIconicShow
                                                                                                                                                                                                                                            • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                            • API String ID: 4125248594-2988720461
                                                                                                                                                                                                                                            • Opcode ID: 0a2872db900ce5d1f47576c6baab7ec1de3f53db25a3d59b38b6fcf1a03f6bf9
                                                                                                                                                                                                                                            • Instruction ID: 8803d0eaa2751f640cfc20a4312532d0f4300deff49733441a20a74cb8e1cef3
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 0a2872db900ce5d1f47576c6baab7ec1de3f53db25a3d59b38b6fcf1a03f6bf9
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 17315271A412197EEF206BB66C49FBF7F6CEB44B50F210066F601F61D1C6B09D00EA61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EA16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00EA170D
                                                                                                                                                                                                                                              • Part of subcall function 00EA16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00EA173A
                                                                                                                                                                                                                                              • Part of subcall function 00EA16C3: GetLastError.KERNEL32 ref: 00EA174A
                                                                                                                                                                                                                                            • LogonUserW.ADVAPI32(?,?,?,00000000,00000000,?), ref: 00EA1286
                                                                                                                                                                                                                                            • DuplicateTokenEx.ADVAPI32(?,00000000,00000000,00000002,00000001,?), ref: 00EA12A8
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00EA12B9
                                                                                                                                                                                                                                            • OpenWindowStationW.USER32(winsta0,00000000,00060000), ref: 00EA12D1
                                                                                                                                                                                                                                            • GetProcessWindowStation.USER32 ref: 00EA12EA
                                                                                                                                                                                                                                            • SetProcessWindowStation.USER32(00000000), ref: 00EA12F4
                                                                                                                                                                                                                                            • OpenDesktopW.USER32(default,00000000,00000000,00060081), ref: 00EA1310
                                                                                                                                                                                                                                              • Part of subcall function 00EA10BF: AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00EA11FC), ref: 00EA10D4
                                                                                                                                                                                                                                              • Part of subcall function 00EA10BF: CloseHandle.KERNEL32(?,?,00EA11FC), ref: 00EA10E9
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: StationTokenWindow$AdjustCloseHandleOpenPrivilegesProcess$DesktopDuplicateErrorLastLogonLookupPrivilegeUserValue
                                                                                                                                                                                                                                            • String ID: $default$winsta0
                                                                                                                                                                                                                                            • API String ID: 22674027-1027155976
                                                                                                                                                                                                                                            • Opcode ID: 8f27d09e23160f38db8d2cb7eb4d9baaf19f07c2881591ae67e17dd52f33f44e
                                                                                                                                                                                                                                            • Instruction ID: 1ffcd77d93266806ec079102a4c1175759c1d8184a5dba7ae7ec07df65e83dc8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 8f27d09e23160f38db8d2cb7eb4d9baaf19f07c2881591ae67e17dd52f33f44e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 72819E71900209AFDF119FA9DC49FEE7BB9EF0D744F1451AAF920BA1A0C774A944CB21
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EA10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00EA1114
                                                                                                                                                                                                                                              • Part of subcall function 00EA10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00EA0B9B,?,?,?), ref: 00EA1120
                                                                                                                                                                                                                                              • Part of subcall function 00EA10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00EA0B9B,?,?,?), ref: 00EA112F
                                                                                                                                                                                                                                              • Part of subcall function 00EA10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00EA0B9B,?,?,?), ref: 00EA1136
                                                                                                                                                                                                                                              • Part of subcall function 00EA10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00EA114D
                                                                                                                                                                                                                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00EA0BCC
                                                                                                                                                                                                                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00EA0C00
                                                                                                                                                                                                                                            • GetLengthSid.ADVAPI32(?), ref: 00EA0C17
                                                                                                                                                                                                                                            • GetAce.ADVAPI32(?,00000000,?), ref: 00EA0C51
                                                                                                                                                                                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00EA0C6D
                                                                                                                                                                                                                                            • GetLengthSid.ADVAPI32(?), ref: 00EA0C84
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00EA0C8C
                                                                                                                                                                                                                                            • HeapAlloc.KERNEL32(00000000), ref: 00EA0C93
                                                                                                                                                                                                                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00EA0CB4
                                                                                                                                                                                                                                            • CopySid.ADVAPI32(00000000), ref: 00EA0CBB
                                                                                                                                                                                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00EA0CEA
                                                                                                                                                                                                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00EA0D0C
                                                                                                                                                                                                                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00EA0D1E
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EA0D45
                                                                                                                                                                                                                                            • HeapFree.KERNEL32(00000000), ref: 00EA0D4C
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EA0D55
                                                                                                                                                                                                                                            • HeapFree.KERNEL32(00000000), ref: 00EA0D5C
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EA0D65
                                                                                                                                                                                                                                            • HeapFree.KERNEL32(00000000), ref: 00EA0D6C
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00EA0D78
                                                                                                                                                                                                                                            • HeapFree.KERNEL32(00000000), ref: 00EA0D7F
                                                                                                                                                                                                                                              • Part of subcall function 00EA1193: GetProcessHeap.KERNEL32(00000008,00EA0BB1,?,00000000,?,00EA0BB1,?), ref: 00EA11A1
                                                                                                                                                                                                                                              • Part of subcall function 00EA1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00EA0BB1,?), ref: 00EA11A8
                                                                                                                                                                                                                                              • Part of subcall function 00EA1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00EA0BB1,?), ref: 00EA11B7
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 4175595110-0
                                                                                                                                                                                                                                            • Opcode ID: c98619d79d091faf9cbd5fdfdc4bb88a39fed2139c1c67d2345f19e7bdbf72ed
                                                                                                                                                                                                                                            • Instruction ID: 25e20835a46eee071662b84aedb00990ef1781747f0852107cf4265c5fec66fa
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: c98619d79d091faf9cbd5fdfdc4bb88a39fed2139c1c67d2345f19e7bdbf72ed
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 22719C7290121AAFDF10DFA5EC44BAEBBB8FF09354F144115E914BB190D771A909CBA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • OpenClipboard.USER32(00EDCC08), ref: 00EBEB29
                                                                                                                                                                                                                                            • IsClipboardFormatAvailable.USER32(0000000D), ref: 00EBEB37
                                                                                                                                                                                                                                            • GetClipboardData.USER32(0000000D), ref: 00EBEB43
                                                                                                                                                                                                                                            • CloseClipboard.USER32 ref: 00EBEB4F
                                                                                                                                                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00EBEB87
                                                                                                                                                                                                                                            • CloseClipboard.USER32 ref: 00EBEB91
                                                                                                                                                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00EBEBBC
                                                                                                                                                                                                                                            • IsClipboardFormatAvailable.USER32(00000001), ref: 00EBEBC9
                                                                                                                                                                                                                                            • GetClipboardData.USER32(00000001), ref: 00EBEBD1
                                                                                                                                                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00EBEBE2
                                                                                                                                                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00EBEC22
                                                                                                                                                                                                                                            • IsClipboardFormatAvailable.USER32(0000000F), ref: 00EBEC38
                                                                                                                                                                                                                                            • GetClipboardData.USER32(0000000F), ref: 00EBEC44
                                                                                                                                                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00EBEC55
                                                                                                                                                                                                                                            • DragQueryFileW.SHELL32(00000000,000000FF,00000000,00000000), ref: 00EBEC77
                                                                                                                                                                                                                                            • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00EBEC94
                                                                                                                                                                                                                                            • DragQueryFileW.SHELL32(00000000,?,?,00000104), ref: 00EBECD2
                                                                                                                                                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00EBECF3
                                                                                                                                                                                                                                            • CountClipboardFormats.USER32 ref: 00EBED14
                                                                                                                                                                                                                                            • CloseClipboard.USER32 ref: 00EBED59
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Clipboard$Global$AvailableCloseDataDragFileFormatLockQueryUnlock$CountFormatsOpen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 420908878-0
                                                                                                                                                                                                                                            • Opcode ID: 0c43b91d3ca4a845b6720699581d11eeb391d04392496613a8ef1d79bb202de7
                                                                                                                                                                                                                                            • Instruction ID: 930d26ced6e287c3c7b785a65c0e80cb59d0be1a2a3ce3195e79de56f8d9d516
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 0c43b91d3ca4a845b6720699581d11eeb391d04392496613a8ef1d79bb202de7
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D461A0352042029FD310EF25E885FABB7E8EF84758F14651AF456B72A2CB71DD09CB62
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00EB69BE
                                                                                                                                                                                                                                            • FindClose.KERNEL32(00000000), ref: 00EB6A12
                                                                                                                                                                                                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00EB6A4E
                                                                                                                                                                                                                                            • FileTimeToLocalFileTime.KERNEL32(?,?), ref: 00EB6A75
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00EB6AB2
                                                                                                                                                                                                                                            • FileTimeToSystemTime.KERNEL32(?,?), ref: 00EB6ADF
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Time$File$FindLocalSystem$CloseFirst_wcslen
                                                                                                                                                                                                                                            • String ID: %02d$%03d$%4d$%4d%02d%02d%02d%02d%02d$%4d%02d%02d%02d%02d%02d%03d
                                                                                                                                                                                                                                            • API String ID: 3830820486-3289030164
                                                                                                                                                                                                                                            • Opcode ID: cb82f0b20df9ab2a6d69cac5f7e861d4ab3a9a3de641bb088c79f84dff4de4b6
                                                                                                                                                                                                                                            • Instruction ID: 7207e7a5f80b42f7a5d6624915460cff32c8031bddc64e36fb570d1e61b40e8b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: cb82f0b20df9ab2a6d69cac5f7e861d4ab3a9a3de641bb088c79f84dff4de4b6
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 77D14271508300AFC714EBA4D891EAFB7ECAF88704F44591DF585E7192EB78DA48CB62
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00EB9663
                                                                                                                                                                                                                                            • GetFileAttributesW.KERNEL32(?), ref: 00EB96A1
                                                                                                                                                                                                                                            • SetFileAttributesW.KERNEL32(?,?), ref: 00EB96BB
                                                                                                                                                                                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00EB96D3
                                                                                                                                                                                                                                            • FindClose.KERNEL32(00000000), ref: 00EB96DE
                                                                                                                                                                                                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00EB96FA
                                                                                                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00EB974A
                                                                                                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(00F06B7C), ref: 00EB9768
                                                                                                                                                                                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EB9772
                                                                                                                                                                                                                                            • FindClose.KERNEL32(00000000), ref: 00EB977F
                                                                                                                                                                                                                                            • FindClose.KERNEL32(00000000), ref: 00EB978F
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Find$File$Close$AttributesCurrentDirectoryFirstNext
                                                                                                                                                                                                                                            • String ID: *.*
                                                                                                                                                                                                                                            • API String ID: 1409584000-438819550
                                                                                                                                                                                                                                            • Opcode ID: c5368aac009b2882671d91a76362d834c48f6f1c1e0d66220677198b6e9d288d
                                                                                                                                                                                                                                            • Instruction ID: 477f0aeabb417e520eca6b65039dc6e0fe1a440efb38c0746422e3dfc3f58c3c
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: c5368aac009b2882671d91a76362d834c48f6f1c1e0d66220677198b6e9d288d
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 3F31D07264161A6ECB20AFB5EC48ADF77ECDF49364F205157FA04F21A1EB34D944CA50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • FindFirstFileW.KERNEL32(?,?,74DE8FB0,?,00000000), ref: 00EB97BE
                                                                                                                                                                                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00EB9819
                                                                                                                                                                                                                                            • FindClose.KERNEL32(00000000), ref: 00EB9824
                                                                                                                                                                                                                                            • FindFirstFileW.KERNEL32(*.*,?), ref: 00EB9840
                                                                                                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00EB9890
                                                                                                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(00F06B7C), ref: 00EB98AE
                                                                                                                                                                                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EB98B8
                                                                                                                                                                                                                                            • FindClose.KERNEL32(00000000), ref: 00EB98C5
                                                                                                                                                                                                                                            • FindClose.KERNEL32(00000000), ref: 00EB98D5
                                                                                                                                                                                                                                              • Part of subcall function 00EADAE5: CreateFileW.KERNEL32(?,40000000,00000001,00000000,00000003,02000080,00000000), ref: 00EADB00
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Find$File$Close$CurrentDirectoryFirstNext$Create
                                                                                                                                                                                                                                            • String ID: *.*
                                                                                                                                                                                                                                            • API String ID: 2640511053-438819550
                                                                                                                                                                                                                                            • Opcode ID: c2363b867b95f64ad2523ae09c5c1e8bf9863d396c5430e6cc840b6667743050
                                                                                                                                                                                                                                            • Instruction ID: ed3aba3130f830c6eb02f0d6be297807dbd4a13ef59cc3e153c186fa3e1e084a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: c2363b867b95f64ad2523ae09c5c1e8bf9863d396c5430e6cc840b6667743050
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7A31F27254161A6EDB24AFB4EC48ADF77BCDF0A364F205166EA00F20A1DB30D948DB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00ECB6AE,?,?), ref: 00ECC9B5
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: _wcslen.LIBCMT ref: 00ECC9F1
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: _wcslen.LIBCMT ref: 00ECCA68
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: _wcslen.LIBCMT ref: 00ECCA9E
                                                                                                                                                                                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00ECBF3E
                                                                                                                                                                                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?), ref: 00ECBFA9
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00ECBFCD
                                                                                                                                                                                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,?,00000000,?), ref: 00ECC02C
                                                                                                                                                                                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,00000008), ref: 00ECC0E7
                                                                                                                                                                                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00ECC154
                                                                                                                                                                                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00ECC1E9
                                                                                                                                                                                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,00000000,?,?,?,00000000), ref: 00ECC23A
                                                                                                                                                                                                                                            • RegQueryValueExW.ADVAPI32(?,?,00000000,00000000,?,?,?,00000000), ref: 00ECC2E3
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00ECC382
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00ECC38F
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: QueryValue$Close_wcslen$BuffCharConnectOpenRegistryUpper
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3102970594-0
                                                                                                                                                                                                                                            • Opcode ID: 2318dfaef6d6b5cbde2e28ffd9d0910c8fc1ad8bd730b84cc92775ba0c9e732a
                                                                                                                                                                                                                                            • Instruction ID: 09805840f822113d2a30beb89c459f27f4a16e64c7a24afb857285d864f6af19
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 2318dfaef6d6b5cbde2e28ffd9d0910c8fc1ad8bd730b84cc92775ba0c9e732a
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 5B024E716042409FC714CF28D995F2ABBE5EF89318F18949DF849EB2A2D732EC46CB51
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetLocalTime.KERNEL32(?), ref: 00EB8257
                                                                                                                                                                                                                                            • SystemTimeToFileTime.KERNEL32(?,?), ref: 00EB8267
                                                                                                                                                                                                                                            • LocalFileTimeToFileTime.KERNEL32(?,?), ref: 00EB8273
                                                                                                                                                                                                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00EB8310
                                                                                                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00EB8324
                                                                                                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00EB8356
                                                                                                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00EB838C
                                                                                                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00EB8395
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CurrentDirectoryTime$File$Local$System
                                                                                                                                                                                                                                            • String ID: *.*
                                                                                                                                                                                                                                            • API String ID: 1464919966-438819550
                                                                                                                                                                                                                                            • Opcode ID: c753f7f1a1c615a18d02a1b5ada9234e975bb21eeedf9f1e7406e780320d50e2
                                                                                                                                                                                                                                            • Instruction ID: f7ed375c8c6cad6828da5ca2b102b2d51f1c4282a4b2064a14955e08dc69fd39
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: c753f7f1a1c615a18d02a1b5ada9234e975bb21eeedf9f1e7406e780320d50e2
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: EB616A725043059FC710EF64D84099FB3EDFF89314F04591AF989A7251EB35E909CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E43AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E43A97,?,?,00E42E7F,?,?,?,00000000), ref: 00E43AC2
                                                                                                                                                                                                                                              • Part of subcall function 00EAE199: GetFileAttributesW.KERNEL32(?,00EACF95), ref: 00EAE19A
                                                                                                                                                                                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00EAD122
                                                                                                                                                                                                                                            • DeleteFileW.KERNEL32(?,?,?,?,?,00000000,?,?,?), ref: 00EAD1DD
                                                                                                                                                                                                                                            • MoveFileW.KERNEL32(?,?), ref: 00EAD1F0
                                                                                                                                                                                                                                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 00EAD20D
                                                                                                                                                                                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EAD237
                                                                                                                                                                                                                                              • Part of subcall function 00EAD29C: CopyFileExW.KERNEL32(?,?,00000000,00000000,00000000,00000008,?,?,00EAD21C,?,?), ref: 00EAD2B2
                                                                                                                                                                                                                                            • FindClose.KERNEL32(00000000,?,?,?), ref: 00EAD253
                                                                                                                                                                                                                                            • FindClose.KERNEL32(00000000), ref: 00EAD264
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: File$Find$CloseDelete$AttributesCopyFirstFullMoveNameNextPath
                                                                                                                                                                                                                                            • String ID: \*.*
                                                                                                                                                                                                                                            • API String ID: 1946585618-1173974218
                                                                                                                                                                                                                                            • Opcode ID: ba7fc205b6547c51bcca324981bf54fa493701e81ee7fb1aaf12a549e0988d97
                                                                                                                                                                                                                                            • Instruction ID: 3cd9308bcbdbfe248c167277da91c0cb89bb5cad4f5cc9fd2ce2f6ef014fa0b8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ba7fc205b6547c51bcca324981bf54fa493701e81ee7fb1aaf12a549e0988d97
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: CB615D31C0610D9ECF05EBE0ED92AEDB7B5AF5A304F245165E4027B1A2EB346F09DB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Clipboard$AllocCloseEmptyGlobalOpen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1737998785-0
                                                                                                                                                                                                                                            • Opcode ID: 9da623f1393b692299d7c3dbe53b0839800dcf5bfdb2a2f781dc11aca17ffbd1
                                                                                                                                                                                                                                            • Instruction ID: ded7399f6d92ae488658a5e73f8b543b15343829dab0b48a17c384bb6301141e
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9da623f1393b692299d7c3dbe53b0839800dcf5bfdb2a2f781dc11aca17ffbd1
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4D41EF30205612AFD310CF26E888B9ABBE5FF44358F24E099E425AB762C775EC41CBC0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EA16C3: LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00EA170D
                                                                                                                                                                                                                                              • Part of subcall function 00EA16C3: AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00EA173A
                                                                                                                                                                                                                                              • Part of subcall function 00EA16C3: GetLastError.KERNEL32 ref: 00EA174A
                                                                                                                                                                                                                                            • ExitWindowsEx.USER32(?,00000000), ref: 00EAE932
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: AdjustErrorExitLastLookupPrivilegePrivilegesTokenValueWindows
                                                                                                                                                                                                                                            • String ID: $ $@$SeShutdownPrivilege
                                                                                                                                                                                                                                            • API String ID: 2234035333-3163812486
                                                                                                                                                                                                                                            • Opcode ID: 4975ece6f32a3a6b1fd7ed23b818f19019c737d1c82475be0533af2deec58a2f
                                                                                                                                                                                                                                            • Instruction ID: e61f3434aae2fd4143754d1ed7b0e95a82bbdbdb8e4d2e9138c538f8ecc64f9c
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 4975ece6f32a3a6b1fd7ed23b818f19019c737d1c82475be0533af2deec58a2f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 0C012632610311AFEB1422B9AC86BFB729C9B4E784F2464A2FC02FA2D1D5A07C4481A0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • socket.WSOCK32(00000002,00000001,00000006,?,00000002,00000000), ref: 00EC1276
                                                                                                                                                                                                                                            • WSAGetLastError.WSOCK32 ref: 00EC1283
                                                                                                                                                                                                                                            • bind.WSOCK32(00000000,?,00000010), ref: 00EC12BA
                                                                                                                                                                                                                                            • WSAGetLastError.WSOCK32 ref: 00EC12C5
                                                                                                                                                                                                                                            • closesocket.WSOCK32(00000000), ref: 00EC12F4
                                                                                                                                                                                                                                            • listen.WSOCK32(00000000,00000005), ref: 00EC1303
                                                                                                                                                                                                                                            • WSAGetLastError.WSOCK32 ref: 00EC130D
                                                                                                                                                                                                                                            • closesocket.WSOCK32(00000000), ref: 00EC133C
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorLast$closesocket$bindlistensocket
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 540024437-0
                                                                                                                                                                                                                                            • Opcode ID: 9d5f819410692149e0ad9b1c110e98181f675e73a8dff4899b2d38919c886681
                                                                                                                                                                                                                                            • Instruction ID: dd0dee481eea1b26f553316639560b5a868a9ee7da30f535b43d184769e20fce
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9d5f819410692149e0ad9b1c110e98181f675e73a8dff4899b2d38919c886681
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: A041A0356001419FD714DF24D584F29BBE5EF46318F28918DD856AF2A3C732EC86DBA1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E43AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E43A97,?,?,00E42E7F,?,?,?,00000000), ref: 00E43AC2
                                                                                                                                                                                                                                              • Part of subcall function 00EAE199: GetFileAttributesW.KERNEL32(?,00EACF95), ref: 00EAE19A
                                                                                                                                                                                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00EAD420
                                                                                                                                                                                                                                            • DeleteFileW.KERNEL32(?,?,?,?), ref: 00EAD470
                                                                                                                                                                                                                                            • FindNextFileW.KERNEL32(00000000,00000010), ref: 00EAD481
                                                                                                                                                                                                                                            • FindClose.KERNEL32(00000000), ref: 00EAD498
                                                                                                                                                                                                                                            • FindClose.KERNEL32(00000000), ref: 00EAD4A1
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: FileFind$Close$AttributesDeleteFirstFullNameNextPath
                                                                                                                                                                                                                                            • String ID: \*.*
                                                                                                                                                                                                                                            • API String ID: 2649000838-1173974218
                                                                                                                                                                                                                                            • Opcode ID: eda246a229c0365aa2ed2d573acdb73c9e790d6ae7833c3e1b999b590a68e9ff
                                                                                                                                                                                                                                            • Instruction ID: b05f46a3ac9404aaf104b11cddc43c038a40aebe69984c735607053de94f0c40
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: eda246a229c0365aa2ed2d573acdb73c9e790d6ae7833c3e1b999b590a68e9ff
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: E531727100D3459FC304EF64E8558AF77E8AE9A314F446A2DF4E2631A1EB30AA09D763
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: __floor_pentium4
                                                                                                                                                                                                                                            • String ID: 1#IND$1#INF$1#QNAN$1#SNAN
                                                                                                                                                                                                                                            • API String ID: 4168288129-2761157908
                                                                                                                                                                                                                                            • Opcode ID: c042906b44b52d05239c06e5fd8d32ccc7da0edd1f8ba3f852942a8c388dc3af
                                                                                                                                                                                                                                            • Instruction ID: 58a0f769a54dbd9bfde5d09c8e8f59e997df20bc96f32fa46e0062ab8b5b5e98
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: c042906b44b52d05239c06e5fd8d32ccc7da0edd1f8ba3f852942a8c388dc3af
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D9C22972E086298FDB29CE28DD407EAB7B5EB49305F1491EAD44DF7241E774AE818F40
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EB64DC
                                                                                                                                                                                                                                            • CoInitialize.OLE32(00000000), ref: 00EB6639
                                                                                                                                                                                                                                            • CoCreateInstance.OLE32(00EDFCF8,00000000,00000001,00EDFB68,?), ref: 00EB6650
                                                                                                                                                                                                                                            • CoUninitialize.OLE32 ref: 00EB68D4
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CreateInitializeInstanceUninitialize_wcslen
                                                                                                                                                                                                                                            • String ID: .lnk
                                                                                                                                                                                                                                            • API String ID: 886957087-24824748
                                                                                                                                                                                                                                            • Opcode ID: fe8ef9693371eac7437e0c73065c1cd0df05249df03aa415dcaf6ff40f9835b7
                                                                                                                                                                                                                                            • Instruction ID: 02cd940b522b5d10f01e5dbef5662dde1e220d0bf1849d1a1ec407f7d4b10e2c
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: fe8ef9693371eac7437e0c73065c1cd0df05249df03aa415dcaf6ff40f9835b7
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C7D159716093019FC314EF24D881DABB7E8FF98304F14596DF595AB2A2DB31E909CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetForegroundWindow.USER32(?,?,00000000), ref: 00EC22E8
                                                                                                                                                                                                                                              • Part of subcall function 00EBE4EC: GetWindowRect.USER32(?,?), ref: 00EBE504
                                                                                                                                                                                                                                            • GetDesktopWindow.USER32 ref: 00EC2312
                                                                                                                                                                                                                                            • GetWindowRect.USER32(00000000), ref: 00EC2319
                                                                                                                                                                                                                                            • mouse_event.USER32(00008001,?,?,00000002,00000002), ref: 00EC2355
                                                                                                                                                                                                                                            • GetCursorPos.USER32(?), ref: 00EC2381
                                                                                                                                                                                                                                            • mouse_event.USER32(00008001,?,?,00000000,00000000), ref: 00EC23DF
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$Rectmouse_event$CursorDesktopForeground
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2387181109-0
                                                                                                                                                                                                                                            • Opcode ID: 37a9a07ca519b937aa0d9ffbd10db3a1f52df991e58420d3fe5b8ab4b589edb2
                                                                                                                                                                                                                                            • Instruction ID: c8e071173daab4885897037d8360d8b41836da500d2418ea1a607264b72aa621
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 37a9a07ca519b937aa0d9ffbd10db3a1f52df991e58420d3fe5b8ab4b589edb2
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2031DE72105346AFCB20DF19D904F9BB7A9FB88714F10191EF984A7181DA35E909CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                            • FindFirstFileW.KERNEL32(00000001,?,*.*,?,?,00000000,00000000), ref: 00EB9B78
                                                                                                                                                                                                                                            • FindClose.KERNEL32(00000000,?,00000000,00000000), ref: 00EB9C8B
                                                                                                                                                                                                                                              • Part of subcall function 00EB3874: GetInputState.USER32 ref: 00EB38CB
                                                                                                                                                                                                                                              • Part of subcall function 00EB3874: PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EB3966
                                                                                                                                                                                                                                            • Sleep.KERNEL32(0000000A,?,00000000,00000000), ref: 00EB9BA8
                                                                                                                                                                                                                                            • FindNextFileW.KERNEL32(?,?,?,00000000,00000000), ref: 00EB9C75
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Find$File$CloseFirstInputMessageNextPeekSleepState_wcslen
                                                                                                                                                                                                                                            • String ID: *.*
                                                                                                                                                                                                                                            • API String ID: 1972594611-438819550
                                                                                                                                                                                                                                            • Opcode ID: d735f93a7f136cb9f5ccf4c9b4e886e08617fd52e912c8e82caf59f84362144f
                                                                                                                                                                                                                                            • Instruction ID: 4ca11864184f32fdc87c7695ca01d3f37928dcfa101a1ea79a50892fb97972ff
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: d735f93a7f136cb9f5ccf4c9b4e886e08617fd52e912c8e82caf59f84362144f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 68417E7194020A9FCF14DFA4D889AEEBBF4EF05354F245156E505B21A2EB309E44CF60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E59BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E59BB2
                                                                                                                                                                                                                                            • DefDlgProcW.USER32(?,?,?,?,?), ref: 00E59A4E
                                                                                                                                                                                                                                            • GetSysColor.USER32(0000000F), ref: 00E59B23
                                                                                                                                                                                                                                            • SetBkColor.GDI32(?,00000000), ref: 00E59B36
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Color$LongProcWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3131106179-0
                                                                                                                                                                                                                                            • Opcode ID: 213502412a30f1875ae5b618d1ba164bc9f80fc7f00d9c6b2d1653436be6ecb7
                                                                                                                                                                                                                                            • Instruction ID: e991aa8b500467bcff86a0bf8d9b0af14f6a31608b24ad48844238fbb28bfacc
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 213502412a30f1875ae5b618d1ba164bc9f80fc7f00d9c6b2d1653436be6ecb7
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 36A15CB0218144FEEB289A3C8C48DFB369DEB42346F15790AF942F66D3CA259D0DD275
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EC304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00EC307A
                                                                                                                                                                                                                                              • Part of subcall function 00EC304E: _wcslen.LIBCMT ref: 00EC309B
                                                                                                                                                                                                                                            • socket.WSOCK32(00000002,00000002,00000011,?,?,00000000), ref: 00EC185D
                                                                                                                                                                                                                                            • WSAGetLastError.WSOCK32 ref: 00EC1884
                                                                                                                                                                                                                                            • bind.WSOCK32(00000000,?,00000010), ref: 00EC18DB
                                                                                                                                                                                                                                            • WSAGetLastError.WSOCK32 ref: 00EC18E6
                                                                                                                                                                                                                                            • closesocket.WSOCK32(00000000), ref: 00EC1915
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorLast$_wcslenbindclosesocketinet_addrsocket
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1601658205-0
                                                                                                                                                                                                                                            • Opcode ID: f4996a1eca3ff34f356ac2be4f6ac43b42c422a45d01fbbf01928fc6e9082fff
                                                                                                                                                                                                                                            • Instruction ID: b5783655b5d5dd336b8adc63228a01c7edf4873f55daa6c4781a9d80b1151601
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f4996a1eca3ff34f356ac2be4f6ac43b42c422a45d01fbbf01928fc6e9082fff
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 6251E071A00200AFDB10AF24D986F2AB7E5AB45718F18948CF9057F383C771AD42CBA1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$EnabledForegroundIconicVisibleZoomed
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 292994002-0
                                                                                                                                                                                                                                            • Opcode ID: 1b50ff85a8d3833de12ed6d54c1bd1550aa30b99db8053251d17bcccbd06f523
                                                                                                                                                                                                                                            • Instruction ID: e0fc917365b182e51e0d5c97e3f1d18c1ae5abecbd80f083b9012200fb4439b4
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 1b50ff85a8d3833de12ed6d54c1bd1550aa30b99db8053251d17bcccbd06f523
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B92127317512016FD7248F2AD844B6ABBE5EF84319F29A09EE846EB351C771EC43CB90
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID: ERCP$VUUU$VUUU$VUUU$VUUU
                                                                                                                                                                                                                                            • API String ID: 0-1546025612
                                                                                                                                                                                                                                            • Opcode ID: 688611b9938f8d8cfb817c40f6345a22bc7d83e6869e7e19ae9150cbacae0f63
                                                                                                                                                                                                                                            • Instruction ID: f0e7da436bc44c66b1d1775b697bfc4a048daea386c54bd7bbe5877b18365af5
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 688611b9938f8d8cfb817c40f6345a22bc7d83e6869e7e19ae9150cbacae0f63
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C0A28C71A0021ACBDF24DF58D9407EEB7B1BB54318F2491AAE81DB7285EB749D81CF90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetKeyboardState.USER32(?,00000001,00000040,00000000), ref: 00EAAAAC
                                                                                                                                                                                                                                            • SetKeyboardState.USER32(00000080), ref: 00EAAAC8
                                                                                                                                                                                                                                            • PostMessageW.USER32(?,00000102,00000001,00000001), ref: 00EAAB36
                                                                                                                                                                                                                                            • SendInput.USER32(00000001,?,0000001C,00000001,00000040,00000000), ref: 00EAAB88
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 432972143-0
                                                                                                                                                                                                                                            • Opcode ID: 5a9c2462101e06a0ae1594722ff01e83c2344e1124dba40515f6a2633883d44c
                                                                                                                                                                                                                                            • Instruction ID: 2d8f3c3ecfad7c31784d8087dade4d7c92fd67736f94431bb4c98fc56a59922c
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 5a9c2462101e06a0ae1594722ff01e83c2344e1124dba40515f6a2633883d44c
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 83312B30A40308AEEB308A65CC05BFA77E6AB4E314F18622AE0817A1D1D374A985C772
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7BB7F
                                                                                                                                                                                                                                              • Part of subcall function 00E729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00E7D7D1,00000000,00000000,00000000,00000000,?,00E7D7F8,00000000,00000007,00000000,?,00E7DBF5,00000000), ref: 00E729DE
                                                                                                                                                                                                                                              • Part of subcall function 00E729C8: GetLastError.KERNEL32(00000000,?,00E7D7D1,00000000,00000000,00000000,00000000,?,00E7D7F8,00000000,00000007,00000000,?,00E7DBF5,00000000,00000000), ref: 00E729F0
                                                                                                                                                                                                                                            • GetTimeZoneInformation.KERNEL32 ref: 00E7BB91
                                                                                                                                                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,?,00F1121C,000000FF,?,0000003F,?,?), ref: 00E7BC09
                                                                                                                                                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,?,00F11270,000000FF,?,0000003F,?,?,?,00F1121C,000000FF,?,0000003F,?,?), ref: 00E7BC36
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ByteCharMultiWide$ErrorFreeHeapInformationLastTimeZone_free
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 806657224-0
                                                                                                                                                                                                                                            • Opcode ID: f52765e34293b2832cf2a72d25287eef7862accf663482615e4a9c2df115381d
                                                                                                                                                                                                                                            • Instruction ID: 6d607be3d04e0246fb6855263479aafd5a9ae002522056493ea0cfcdb9962975
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f52765e34293b2832cf2a72d25287eef7862accf663482615e4a9c2df115381d
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4C31F270904249EFCB11DF69DC80AA9BBB8FF45350B15D2AAE118FB2A1C7709D41EB50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • InternetReadFile.WININET(?,?,00000400,?), ref: 00EBCE89
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(?,00000000), ref: 00EBCEEA
                                                                                                                                                                                                                                            • SetEvent.KERNEL32(?,?,00000000), ref: 00EBCEFE
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorEventFileInternetLastRead
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 234945975-0
                                                                                                                                                                                                                                            • Opcode ID: e0b84d36dc232042125b3e49e1b8e53341daeab533a43a62280452eb8958fea7
                                                                                                                                                                                                                                            • Instruction ID: 604334c2866849024459bec55f17169701b04b29556e9b6a7e0d2b70db844d2b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: e0b84d36dc232042125b3e49e1b8e53341daeab533a43a62280452eb8958fea7
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7D21AC71608706DFDB209FA5E948BA777F8EB00358F20541AE646E2151E770EA08CBA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • lstrlenW.KERNEL32(?,?,?,00000000), ref: 00EA82AA
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: lstrlen
                                                                                                                                                                                                                                            • String ID: ($|
                                                                                                                                                                                                                                            • API String ID: 1659193697-1631851259
                                                                                                                                                                                                                                            • Opcode ID: 8369f215e1ec802fec1cdf9656bb4c9b69abc07e453ac86ad29df9e3b27a4680
                                                                                                                                                                                                                                            • Instruction ID: a4323a4e47fdb3d6ebcc9c043bafdae6fcd56d01f9ed86c09140408016711286
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 8369f215e1ec802fec1cdf9656bb4c9b69abc07e453ac86ad29df9e3b27a4680
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: CA323574A007059FCB28CF59C581AAAB7F0FF48714B15D56EE49AEB3A1EB70E941CB40
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00EB5CC1
                                                                                                                                                                                                                                            • FindNextFileW.KERNEL32(00000000,?), ref: 00EB5D17
                                                                                                                                                                                                                                            • FindClose.KERNEL32(?), ref: 00EB5D5F
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Find$File$CloseFirstNext
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3541575487-0
                                                                                                                                                                                                                                            • Opcode ID: 9fea8dfe7bb2add8d6d4e1355389758682d85afba364ce823acd57f56e1266aa
                                                                                                                                                                                                                                            • Instruction ID: e61b962e254d0f028e4fc59aed72b2fedef3e06ccd89daed40eac57bfd05bf69
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9fea8dfe7bb2add8d6d4e1355389758682d85afba364ce823acd57f56e1266aa
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9C51AA75604A019FC714CF28D494A96B7E4FF49318F24965EE99AAB3A1CB30FD04CF91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • IsDebuggerPresent.KERNEL32 ref: 00E7271A
                                                                                                                                                                                                                                            • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 00E72724
                                                                                                                                                                                                                                            • UnhandledExceptionFilter.KERNEL32(?), ref: 00E72731
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ExceptionFilterUnhandled$DebuggerPresent
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3906539128-0
                                                                                                                                                                                                                                            • Opcode ID: 54fd4f21b4f81ae6a2d426225aa8dcc6de1ea72e5210a0badfffee44c5461969
                                                                                                                                                                                                                                            • Instruction ID: c5c1d3c0dd03271da6c693d085602d89b81c3d34c122a858ffbc33d01a3db0fe
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 54fd4f21b4f81ae6a2d426225aa8dcc6de1ea72e5210a0badfffee44c5461969
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7C31D574D5122D9BCB21DF68DD8879DB7B8AF08350F5052EAE91CA7260E7309F858F44
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SetErrorMode.KERNEL32(00000001), ref: 00EB51DA
                                                                                                                                                                                                                                            • GetDiskFreeSpaceExW.KERNEL32(?,?,?,?), ref: 00EB5238
                                                                                                                                                                                                                                            • SetErrorMode.KERNEL32(00000000), ref: 00EB52A1
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorMode$DiskFreeSpace
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1682464887-0
                                                                                                                                                                                                                                            • Opcode ID: 26b6c16d751b8bee3c797ba98abdf866d9a36a3524e3462942f80fbf32e2d7c1
                                                                                                                                                                                                                                            • Instruction ID: f4924257ee179838f7c612a5fe09ec43a6d601e6c709565d2b84f9870286c2b1
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 26b6c16d751b8bee3c797ba98abdf866d9a36a3524e3462942f80fbf32e2d7c1
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9D316B35A00518DFDB00DF54D884EAEBBF4FF09318F188099E805AB362CB35E84ACB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E5FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00E60668
                                                                                                                                                                                                                                              • Part of subcall function 00E5FDDB: __CxxThrowException@8.LIBVCRUNTIME ref: 00E60685
                                                                                                                                                                                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,00000000,00000004), ref: 00EA170D
                                                                                                                                                                                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,00000000,?,00000000,?), ref: 00EA173A
                                                                                                                                                                                                                                            • GetLastError.KERNEL32 ref: 00EA174A
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Exception@8Throw$AdjustErrorLastLookupPrivilegePrivilegesTokenValue
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 577356006-0
                                                                                                                                                                                                                                            • Opcode ID: 127a04a02964556e068a0e3a2fddfe0c9185908788d7d12f13ce31f7538e7066
                                                                                                                                                                                                                                            • Instruction ID: 8038ef606234dc1b52faec3812050c316e9181108154f33cfd3d4bca9287e245
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 127a04a02964556e068a0e3a2fddfe0c9185908788d7d12f13ce31f7538e7066
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: A31101B2400305AFD7189F54EC86E6AB7F8EB09754B20856EF446A7241EB70BC45CB20
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CreateFileW.KERNEL32(?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00EAD608
                                                                                                                                                                                                                                            • DeviceIoControl.KERNEL32(00000000,002D1400,?,0000000C,?,00000028,?,00000000), ref: 00EAD645
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?,?,00000080,00000003,00000000,00000003,00000080,00000000), ref: 00EAD650
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CloseControlCreateDeviceFileHandle
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 33631002-0
                                                                                                                                                                                                                                            • Opcode ID: 2a077ebed2c4fa12a5f73b5384bd9e3711aeb6d98e78a61ca2c26c6f3db14f91
                                                                                                                                                                                                                                            • Instruction ID: 0da9eaed6b0fcae0cc36905c788bf1643e9f474e1db81ce83e2d5757476e2500
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 2a077ebed2c4fa12a5f73b5384bd9e3711aeb6d98e78a61ca2c26c6f3db14f91
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 39118EB1E05228BFDB108F95EC44FAFBBBCEB49B50F108152F904F7290C2705A058BA1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • AllocateAndInitializeSid.ADVAPI32(?,00000002,00000020,00000220,00000000,00000000,00000000,00000000,00000000,00000000,?,?), ref: 00EA168C
                                                                                                                                                                                                                                            • CheckTokenMembership.ADVAPI32(00000000,?,?), ref: 00EA16A1
                                                                                                                                                                                                                                            • FreeSid.ADVAPI32(?), ref: 00EA16B1
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: AllocateCheckFreeInitializeMembershipToken
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3429775523-0
                                                                                                                                                                                                                                            • Opcode ID: 5dbb4ad850b4aef1ba3818db497cb15726fe71f75ae37a5bfd20f1b8d85922af
                                                                                                                                                                                                                                            • Instruction ID: 2b7d307d7313f5549cb8882c87bef58c4204d0e4dddeee5cede7daeb92e2e947
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 5dbb4ad850b4aef1ba3818db497cb15726fe71f75ae37a5bfd20f1b8d85922af
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 92F0F471951309FFDF00DFE59C89AAEBBBCEB08644F5045A5E501E2181E774AA489A50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetUserNameW.ADVAPI32(?,?), ref: 00E9D28C
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: NameUser
                                                                                                                                                                                                                                            • String ID: X64
                                                                                                                                                                                                                                            • API String ID: 2645101109-893830106
                                                                                                                                                                                                                                            • Opcode ID: 127c0c3e2e492691856ebedaf245c628a6d0ca614bd562e6ee2c1ea1621d90e0
                                                                                                                                                                                                                                            • Instruction ID: 69e81a45222168db081b3cce7d3a7c486d2f104dfd537e7d85ea7d160790bab5
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 127c0c3e2e492691856ebedaf245c628a6d0ca614bd562e6ee2c1ea1621d90e0
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 48D0C9B480512DEECF90CB90EC88DD9B37CFB04345F100552F506B2080D73095488F10
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                            • Instruction ID: f745cfb2b28293938f5a0d7ca4c6ebeac9b6fe71a102a0967cc08f798c8dd093
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 2fbdbeface8d474e65e3d830227d731b015bc4fe83c76ff0107a9da6199ccf29
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2F023B71E402199BDF14CFA9D8806ADFBF1EF88354F25916AD859FB380D731AA41CB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • FindFirstFileW.KERNEL32(?,?), ref: 00EB6918
                                                                                                                                                                                                                                            • FindClose.KERNEL32(00000000), ref: 00EB6961
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Find$CloseFileFirst
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2295610775-0
                                                                                                                                                                                                                                            • Opcode ID: be000ff2110ff5b5e99c25d3c4690137ea75d5167baecfd13597eb7bf1aeb489
                                                                                                                                                                                                                                            • Instruction ID: af807acd4400e3ac72f522a9ed71dcc7d5735fcdecb7c4dc90e5a09430fe4113
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: be000ff2110ff5b5e99c25d3c4690137ea75d5167baecfd13597eb7bf1aeb489
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9B11E2316046019FC710CF29D484A16BBE1FF84328F14C699F8699F7A2C734EC05CB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(00000000,?,00000FFF,00000000,?,?,?,00EC4891,?,?,00000035,?), ref: 00EB37E4
                                                                                                                                                                                                                                            • FormatMessageW.KERNEL32(00001000,00000000,?,00000000,?,00000FFF,00000000,?,?,?,00EC4891,?,?,00000035,?), ref: 00EB37F4
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorFormatLastMessage
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3479602957-0
                                                                                                                                                                                                                                            • Opcode ID: bcb37172e9eaea9b52ff33dce189676370754b763500dbecb73dba15d283f60f
                                                                                                                                                                                                                                            • Instruction ID: 584da97fcfaef2656eecd55635d0db2d2e61d23699d3bfb2fcdd126aa33abf65
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: bcb37172e9eaea9b52ff33dce189676370754b763500dbecb73dba15d283f60f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 60F0EC707052356AD71017B66C4DFDB779DEFC4761F100166F509F2191D9605904C7B0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendInput.USER32(00000001,?,0000001C,?,?,00000002), ref: 00EAB25D
                                                                                                                                                                                                                                            • keybd_event.USER32(?,75C0C0D0,?,00000000), ref: 00EAB270
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: InputSendkeybd_event
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3536248340-0
                                                                                                                                                                                                                                            • Opcode ID: 131b2d1f9c689ffc3f1755cefac5018edd2efba88b509b9a8f17a2654ab7ae37
                                                                                                                                                                                                                                            • Instruction ID: f100df0233d6cb4157fc50c658961a1c90523dd702393bc27f4870fa254b78ab
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 131b2d1f9c689ffc3f1755cefac5018edd2efba88b509b9a8f17a2654ab7ae37
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D9F06D7080424EAFDB058FA1D805BEE7BB4FF08309F10804AF951A91A2C3799205DFA4
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • AdjustTokenPrivileges.ADVAPI32(?,00000000,?,00000000,00000000,00000000,?,00EA11FC), ref: 00EA10D4
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?,?,00EA11FC), ref: 00EA10E9
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: AdjustCloseHandlePrivilegesToken
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 81990902-0
                                                                                                                                                                                                                                            • Opcode ID: a36e9ef36e478b614ea89352a971a1e35bcd134b1808f505e8dfab81f6daa263
                                                                                                                                                                                                                                            • Instruction ID: 0d29c5fde237f6591117c915852a5adc3110294861df175df5346124028f6932
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a36e9ef36e478b614ea89352a971a1e35bcd134b1808f505e8dfab81f6daa263
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 04E04F32008601AEE7252B11FC06F7377E9EB04321F20882EF9A5904B1DB626C94DB10
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            • Variable is not of type 'Object'., xrefs: 00E90C40
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID: Variable is not of type 'Object'.
                                                                                                                                                                                                                                            • API String ID: 0-1840281001
                                                                                                                                                                                                                                            • Opcode ID: ecf939e3cb9d311f686b5e39df0f9eb3a3eea7596895a7452b597018e89d79ca
                                                                                                                                                                                                                                            • Instruction ID: 3895e5ae798c2d95135c5af48b799497c9a463ae74e532670823b01b8408a686
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ecf939e3cb9d311f686b5e39df0f9eb3a3eea7596895a7452b597018e89d79ca
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4D328C70A01218DFCF54DF90E881AEDB7F5BF04308F646069E806BB292D775AE49CB51
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,00E76766,?,?,00000008,?,?,00E7FEFE,00000000), ref: 00E76998
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ExceptionRaise
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3997070919-0
                                                                                                                                                                                                                                            • Opcode ID: c4e062eb8f3ef88bf291c4039619f478634e0f4db52d0be5de11fc8545ebe67c
                                                                                                                                                                                                                                            • Instruction ID: 288c9deec47d916d0f88ff407f3ef69113f65278fb31594c8d494ade3caa8b58
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: c4e062eb8f3ef88bf291c4039619f478634e0f4db52d0be5de11fc8545ebe67c
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D1B15A31510A099FEB19CF28C486BA47BA0FF4536CF25D658E99DDF2A2C335D985CB40
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 0-3916222277
                                                                                                                                                                                                                                            • Opcode ID: 27f27ef3bcaffaea332546f642ab64086685eae004bac4d2db74eede92c3336a
                                                                                                                                                                                                                                            • Instruction ID: 66d51a5b02c6600f08322ad3bf127e337dbbadeda0578f60d534046f4f0728a4
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 27f27ef3bcaffaea332546f642ab64086685eae004bac4d2db74eede92c3336a
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 65125E719002299FCF24CF58C9806EEB7F5FF48710F1495AAE849FB251EB309A85CB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • BlockInput.USER32(00000001), ref: 00EBEABD
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: BlockInput
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3456056419-0
                                                                                                                                                                                                                                            • Opcode ID: 1294b131ae9ee6417c5b89271af1979ba5c180dd9bc59e376be93220a9a760cd
                                                                                                                                                                                                                                            • Instruction ID: eabadcdb31dab44adf2383981fd2a70825f3b97093efa623a671b3c8c92d5891
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 1294b131ae9ee6417c5b89271af1979ba5c180dd9bc59e376be93220a9a760cd
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 61E01A312002049FC710EF6AE804EDAF7EDAF987A0F109416FC49E7391DA74E8448B90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SetUnhandledExceptionFilter.KERNEL32(Function_000209E1,00E603EE), ref: 00E609DA
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ExceptionFilterUnhandled
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3192549508-0
                                                                                                                                                                                                                                            • Opcode ID: 128992c9a0924e98686d029631696cc138958293d2a4f309f701d02586dc4cb1
                                                                                                                                                                                                                                            • Instruction ID: a51352dea29d5da1aae6c28f4b69eb0c5a151e18a0a3b1a529b1576b1b15d2aa
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 128992c9a0924e98686d029631696cc138958293d2a4f309f701d02586dc4cb1
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash:
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID: 0
                                                                                                                                                                                                                                            • API String ID: 0-4108050209
                                                                                                                                                                                                                                            • Opcode ID: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                            • Instruction ID: e28de22f18323e8738e4032b13a837609c76468a38f2786d242f951a0b6e3ed0
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9084b4e029052128895840c3c28e948f6724b1d83b91d22a18243ac96ad56844
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 815175616CC7155ADB3C8578B95A7FE67D59B823CCF183A09D8C2F7282C611EE41C352
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: c4c0a90d39b8f0880a393ad7422cafc973ccc430c49948ee9628ca16e5862d6e
                                                                                                                                                                                                                                            • Instruction ID: d3b2989061178b3841704a7c655c19f9a09ee567bd8e524cc4acd4cc21fbcdd1
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: c4c0a90d39b8f0880a393ad7422cafc973ccc430c49948ee9628ca16e5862d6e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 61327722D28F454DD7239A35CC62335664DAFB33C9F15E33BF86AB99A5EB28C4834100
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: 23015ca265ea2371c5dc6969254b61d8b32be6b128f0564d495978259327052d
                                                                                                                                                                                                                                            • Instruction ID: 3b41a8e60b8ed503fe562693d5582591b50509ffd18e6437e78d4309345cc5ab
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 23015ca265ea2371c5dc6969254b61d8b32be6b128f0564d495978259327052d
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: E3324D31A002458FDF24EF28C4A46BDBBA1EF45309F38A966D95AF7292D330DD85DB41
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: d8c661981942c9326ab62e578ba014bb8b4b33a9ae79768f9229e59dc4f1a69b
                                                                                                                                                                                                                                            • Instruction ID: 9418db575c0d50f9fca21dbfc9c19f26433baccc40a183e888a55ba99e9508dd
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: d8c661981942c9326ab62e578ba014bb8b4b33a9ae79768f9229e59dc4f1a69b
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: BA22AFB1A006099FDF14DF64D881AEEB3F6FF48304F146529E85AB7291EB359D14CB90
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: 8e8a787025919363c1b38b479032a460844f39833e7a39d928255ed52c541d6d
                                                                                                                                                                                                                                            • Instruction ID: 892e1c86a3e8f8972cbee48e23541117006a2f91213e732a5c85686458c9c86b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 8e8a787025919363c1b38b479032a460844f39833e7a39d928255ed52c541d6d
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: DD02A6B1E00119EBDB04EF64D881AAEB7F5FF44304F109565E81ABB391EB31AE14CB95
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: 1737cf7944651f8ce679964b7215a09e5dfaa4a85c1b3a9c82f525a178b9a9ff
                                                                                                                                                                                                                                            • Instruction ID: 84c53d66de31f4a72bf1407f37cd623394cc4164eac872639898fb2eeac84ca1
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 1737cf7944651f8ce679964b7215a09e5dfaa4a85c1b3a9c82f525a178b9a9ff
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C3B12520D2AF844DC323963A8875336B65CAFBB6C5F91D31BFC2679D22EB2285874140
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                            • Instruction ID: 62f2a4ea21fa1a55fb805f44a572373cda1a1855bd72bbb6e4de06213bb6d9dd
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 93657a121f16255c59120ad0d08fdbba6372c273009ad596b4ecdf6e8f3c6909
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: F79178726480E34ADB2F463AA57407DFFE15A923E631E27DED4F2DA1C1EE20C554E620
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                            • Instruction ID: 6f5aee6c93aaa1a79c9f8099a5a29e2a2d8b2280f489c304f636a17c845e3d6a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 05e0b846b00456d0f1e87463b9d189974beed2fe63262d4392584e128a114ea2
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 3891B67224D4E30ADB6E4239943407EFFE15A923E530E17DDD5F2EB1C1EE248954E620
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                            • Instruction ID: 7320e47ab629cd8acb4662a514797d1a60cd5577a2dca0ae13fc3e28191ed449
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 40101273f58913c3cb3bc7eb54df01d47b4121c3e67d19f11ec2cb23d33ea445
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9E91A3322490E34ADB2F427AA57407DFFE15A923E631E27DDD4F2EA1C1FD148554E620
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: bc81c82a6aefd173da273a4439c703ea70c765aeea8ca6fd5c29bf869fa744fe
                                                                                                                                                                                                                                            • Instruction ID: bbce84a6cb32f16bc6df218121047e9c2ecbbbb2aa125f319845ce9af0b00e5f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: bc81c82a6aefd173da273a4439c703ea70c765aeea8ca6fd5c29bf869fa744fe
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2B6179312C830956DA349A68BDA5BFE63D6DF417CCF103A19E8C2FB281DA119E42C315
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: 8886071ef8d770af383eebb9520f45e43df3b2e81ea008822f76a9053935d752
                                                                                                                                                                                                                                            • Instruction ID: acce68d2c9d1cb7493d9f2f368231ab79c07bbd2f7d52aaa4c641c710ae7b0d9
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 8886071ef8d770af383eebb9520f45e43df3b2e81ea008822f76a9053935d752
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 8A6179316C870956DA388A28B955BBF23C49F437CCF103D5EE9C2FB281EA12AD46C355
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                            • Instruction ID: 5859ae1b45b1b9b2fc35fea00232732fc3132899b43aa822de467bfdc7a691be
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 70da388f96bbbf26b230a155b4728740b34f0d100ea60ab2bbadb9d7d0befbf0
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 3D8161726480E30ADB6F823A953407EFFE15A923E531E27DED4F2DB1C1EE249554E620
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: f2b2d792071d3d466ff05be23aaf14e1eefe31ddf6e4b421f8706f09f2ad14eb
                                                                                                                                                                                                                                            • Instruction ID: 75457d5ac0c09eb27e5ff6bf8dd96618d0c348003039c38630c43e025da7ed2e
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f2b2d792071d3d466ff05be23aaf14e1eefe31ddf6e4b421f8706f09f2ad14eb
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C721E7323206158BDB28CF79C8236BE73E5AB54310F158A2EE4A7D33D0DE35A904DB80
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: 5eccedda4d59d461ace39051ca89190d02fb05e6e9ef7f3bff90add423f835b6
                                                                                                                                                                                                                                            • Instruction ID: d93f52d3f7135b4b8f3aa4e95b6eea1228a09e60594e80fd9dd8b36be13ecfd8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 5eccedda4d59d461ace39051ca89190d02fb05e6e9ef7f3bff90add423f835b6
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B9F0DE0204DEDABBCB5B0622987F1A66FB0C84702422807CF849B06BD79BCC109DC352
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • DeleteObject.GDI32(00000000), ref: 00EC2B30
                                                                                                                                                                                                                                            • DeleteObject.GDI32(00000000), ref: 00EC2B43
                                                                                                                                                                                                                                            • DestroyWindow.USER32 ref: 00EC2B52
                                                                                                                                                                                                                                            • GetDesktopWindow.USER32 ref: 00EC2B6D
                                                                                                                                                                                                                                            • GetWindowRect.USER32(00000000), ref: 00EC2B74
                                                                                                                                                                                                                                            • SetRect.USER32(?,00000000,00000000,00000007,00000002), ref: 00EC2CA3
                                                                                                                                                                                                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,?), ref: 00EC2CB1
                                                                                                                                                                                                                                            • CreateWindowExW.USER32(?,AutoIt v3,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EC2CF8
                                                                                                                                                                                                                                            • GetClientRect.USER32(00000000,?), ref: 00EC2D04
                                                                                                                                                                                                                                            • CreateWindowExW.USER32(00000000,static,00000000,5000000E,00000000,00000000,?,?,00000000,00000000,00000000), ref: 00EC2D40
                                                                                                                                                                                                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EC2D62
                                                                                                                                                                                                                                            • GetFileSize.KERNEL32(00000000,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EC2D75
                                                                                                                                                                                                                                            • GlobalAlloc.KERNEL32(00000002,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EC2D80
                                                                                                                                                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00EC2D89
                                                                                                                                                                                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EC2D98
                                                                                                                                                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00EC2DA1
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EC2DA8
                                                                                                                                                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 00EC2DB3
                                                                                                                                                                                                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EC2DC5
                                                                                                                                                                                                                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00EDFC38,00000000), ref: 00EC2DDB
                                                                                                                                                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 00EC2DEB
                                                                                                                                                                                                                                            • CopyImage.USER32(00000007,00000000,00000000,00000000,00002000), ref: 00EC2E11
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000172,00000000,00000007), ref: 00EC2E30
                                                                                                                                                                                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,?,?,00000020,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EC2E52
                                                                                                                                                                                                                                            • ShowWindow.USER32(00000004,?,88C00000,000000FF,000000FF,?,?,00000000,00000000,00000000), ref: 00EC303F
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$Global$CreateRect$File$DeleteFreeObject$AdjustAllocClientCloseCopyDesktopDestroyHandleImageLoadLockMessagePictureReadSendShowSizeStreamUnlock
                                                                                                                                                                                                                                            • String ID: $AutoIt v3$DISPLAY$static
                                                                                                                                                                                                                                            • API String ID: 2211948467-2373415609
                                                                                                                                                                                                                                            • Opcode ID: 30f87ed827aeecfe911223f58ce8a4b71d1e09d8ef01470de223ace09725f984
                                                                                                                                                                                                                                            • Instruction ID: 827ee94c17b2a395d80f7bb784f8655bdf822858598a4407694c863e6c25240c
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 30f87ed827aeecfe911223f58ce8a4b71d1e09d8ef01470de223ace09725f984
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 1F028871A00219AFDB14CF65DD89EAEBBB9EB48750F10811DF915BB2A0CB35ED05CB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SetTextColor.GDI32(?,00000000), ref: 00ED712F
                                                                                                                                                                                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00ED7160
                                                                                                                                                                                                                                            • GetSysColor.USER32(0000000F), ref: 00ED716C
                                                                                                                                                                                                                                            • SetBkColor.GDI32(?,000000FF), ref: 00ED7186
                                                                                                                                                                                                                                            • SelectObject.GDI32(?,?), ref: 00ED7195
                                                                                                                                                                                                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 00ED71C0
                                                                                                                                                                                                                                            • GetSysColor.USER32(00000010), ref: 00ED71C8
                                                                                                                                                                                                                                            • CreateSolidBrush.GDI32(00000000), ref: 00ED71CF
                                                                                                                                                                                                                                            • FrameRect.USER32(?,?,00000000), ref: 00ED71DE
                                                                                                                                                                                                                                            • DeleteObject.GDI32(00000000), ref: 00ED71E5
                                                                                                                                                                                                                                            • InflateRect.USER32(?,000000FE,000000FE), ref: 00ED7230
                                                                                                                                                                                                                                            • FillRect.USER32(?,?,?), ref: 00ED7262
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00ED7284
                                                                                                                                                                                                                                              • Part of subcall function 00ED73E8: GetSysColor.USER32(00000012), ref: 00ED7421
                                                                                                                                                                                                                                              • Part of subcall function 00ED73E8: SetTextColor.GDI32(?,?), ref: 00ED7425
                                                                                                                                                                                                                                              • Part of subcall function 00ED73E8: GetSysColorBrush.USER32(0000000F), ref: 00ED743B
                                                                                                                                                                                                                                              • Part of subcall function 00ED73E8: GetSysColor.USER32(0000000F), ref: 00ED7446
                                                                                                                                                                                                                                              • Part of subcall function 00ED73E8: GetSysColor.USER32(00000011), ref: 00ED7463
                                                                                                                                                                                                                                              • Part of subcall function 00ED73E8: CreatePen.GDI32(00000000,00000001,00743C00), ref: 00ED7471
                                                                                                                                                                                                                                              • Part of subcall function 00ED73E8: SelectObject.GDI32(?,00000000), ref: 00ED7482
                                                                                                                                                                                                                                              • Part of subcall function 00ED73E8: SetBkColor.GDI32(?,00000000), ref: 00ED748B
                                                                                                                                                                                                                                              • Part of subcall function 00ED73E8: SelectObject.GDI32(?,?), ref: 00ED7498
                                                                                                                                                                                                                                              • Part of subcall function 00ED73E8: InflateRect.USER32(?,000000FF,000000FF), ref: 00ED74B7
                                                                                                                                                                                                                                              • Part of subcall function 00ED73E8: RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00ED74CE
                                                                                                                                                                                                                                              • Part of subcall function 00ED73E8: GetWindowLongW.USER32(00000000,000000F0), ref: 00ED74DB
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Color$Rect$Object$BrushInflateSelect$CreateLongTextWindow$DeleteFillFrameRoundSolid
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 4124339563-0
                                                                                                                                                                                                                                            • Opcode ID: 6fb92e541260f67a4caf96999282c652745eaf0d8a6b8fc214e9f7611bbc057c
                                                                                                                                                                                                                                            • Instruction ID: c9843158cc381d81fb8e6334725b3db8d135ca083aede7d5ba52e481a272b33c
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 6fb92e541260f67a4caf96999282c652745eaf0d8a6b8fc214e9f7611bbc057c
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4BA1B67100A312AFDB009F61EC48E5BB7A9FF49364F201B1AF9A2B61E1D731D949CB51
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • DestroyWindow.USER32(?,?), ref: 00E58E14
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001308,?,00000000), ref: 00E96AC5
                                                                                                                                                                                                                                            • ImageList_Remove.COMCTL32(?,000000FF,?), ref: 00E96AFE
                                                                                                                                                                                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000), ref: 00E96F43
                                                                                                                                                                                                                                              • Part of subcall function 00E58F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E58BE8,?,00000000,?,?,?,?,00E58BBA,00000000,?), ref: 00E58FC5
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001053), ref: 00E96F7F
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001008,000000FF,00000000), ref: 00E96F96
                                                                                                                                                                                                                                            • ImageList_Destroy.COMCTL32(00000000,?), ref: 00E96FAC
                                                                                                                                                                                                                                            • ImageList_Destroy.COMCTL32(00000000,?), ref: 00E96FB7
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: DestroyImageList_MessageSend$Window$InvalidateMoveRectRemove
                                                                                                                                                                                                                                            • String ID: 0
                                                                                                                                                                                                                                            • API String ID: 2760611726-4108050209
                                                                                                                                                                                                                                            • Opcode ID: 6c8cb1f6cb4c5175acbf6c2fe1a67ffe81d6365db8f0ab4d8ce9395852b4b5d8
                                                                                                                                                                                                                                            • Instruction ID: c343cd5c512723a429fc8696b2de08031cfb253d03dade884c5bf1002dad8b69
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 6c8cb1f6cb4c5175acbf6c2fe1a67ffe81d6365db8f0ab4d8ce9395852b4b5d8
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2B12EC30201201EFDB25CF24D985BAAB7F1FB44305F64A42AF995BB261CB31EC56DB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • DestroyWindow.USER32(00000000), ref: 00EC273E
                                                                                                                                                                                                                                            • SystemParametersInfoW.USER32(00000030,00000000,?,00000000), ref: 00EC286A
                                                                                                                                                                                                                                            • SetRect.USER32(?,00000000,00000000,0000012C,?), ref: 00EC28A9
                                                                                                                                                                                                                                            • AdjustWindowRectEx.USER32(?,88C00000,00000000,00000008), ref: 00EC28B9
                                                                                                                                                                                                                                            • CreateWindowExW.USER32(00000008,AutoIt v3,?,88C00000,000000FF,?,?,?,00000000,00000000,00000000), ref: 00EC2900
                                                                                                                                                                                                                                            • GetClientRect.USER32(00000000,?), ref: 00EC290C
                                                                                                                                                                                                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000), ref: 00EC2955
                                                                                                                                                                                                                                            • CreateDCW.GDI32(DISPLAY,00000000,00000000,00000000), ref: 00EC2964
                                                                                                                                                                                                                                            • GetStockObject.GDI32(00000011), ref: 00EC2974
                                                                                                                                                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00EC2978
                                                                                                                                                                                                                                            • GetTextFaceW.GDI32(00000000,00000040,?,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?), ref: 00EC2988
                                                                                                                                                                                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00EC2991
                                                                                                                                                                                                                                            • DeleteDC.GDI32(00000000), ref: 00EC299A
                                                                                                                                                                                                                                            • CreateFontW.GDI32(00000000,00000000,00000000,00000000,00000258,00000000,00000000,00000000,00000001,00000004,00000000,00000002,00000000,?), ref: 00EC29C6
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000030,00000000,00000001), ref: 00EC29DD
                                                                                                                                                                                                                                            • CreateWindowExW.USER32(00000200,msctls_progress32,00000000,50000001,?,-0000001D,00000104,00000014,00000000,00000000,00000000), ref: 00EC2A1D
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000401,00000000,00640000), ref: 00EC2A31
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000404,00000001,00000000), ref: 00EC2A42
                                                                                                                                                                                                                                            • CreateWindowExW.USER32(00000000,static,?,50000000,?,00000041,00000500,-00000027,00000000,00000000,00000000), ref: 00EC2A77
                                                                                                                                                                                                                                            • GetStockObject.GDI32(00000011), ref: 00EC2A82
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000030,00000000,?,50000000), ref: 00EC2A8D
                                                                                                                                                                                                                                            • ShowWindow.USER32(00000004,?,50000000,?,00000004,00000500,-00000017,00000000,00000000,00000000,?,88C00000,000000FF,?,?,?), ref: 00EC2A97
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$Create$MessageSend$ObjectRect$Stock$AdjustCapsClientDeleteDestroyDeviceFaceFontInfoParametersSelectShowSystemText
                                                                                                                                                                                                                                            • String ID: AutoIt v3$DISPLAY$msctls_progress32$static
                                                                                                                                                                                                                                            • API String ID: 2910397461-517079104
                                                                                                                                                                                                                                            • Opcode ID: 622af39e8d8297870e511d33b3c4cca8ccd49367dd94bed867a907842baaa71f
                                                                                                                                                                                                                                            • Instruction ID: 4a030619d16aba4dbd159d14c1a026e0f3e2e57f5f9ca204d2b43cbb28306a59
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 622af39e8d8297870e511d33b3c4cca8ccd49367dd94bed867a907842baaa71f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: DAB15D71A00219AFEB14DF69DD85FAEBBA9FB48710F108519FA14EB290D774ED01CB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SetErrorMode.KERNEL32(00000001), ref: 00EB4AED
                                                                                                                                                                                                                                            • GetDriveTypeW.KERNEL32(?,00EDCB68,?,\\.\,00EDCC08), ref: 00EB4BCA
                                                                                                                                                                                                                                            • SetErrorMode.KERNEL32(00000000,00EDCB68,?,\\.\,00EDCC08), ref: 00EB4D36
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorMode$DriveType
                                                                                                                                                                                                                                            • String ID: 1394$ATA$ATAPI$CDROM$Fibre$FileBackedVirtual$Fixed$MMC$Network$PhysicalDrive$RAID$RAMDisk$Removable$SAS$SATA$SCSI$SSA$SSD$USB$Unknown$Virtual$\\.\$iSCSI
                                                                                                                                                                                                                                            • API String ID: 2907320926-4222207086
                                                                                                                                                                                                                                            • Opcode ID: fac8c8204e0fe19e7a885f1839b95069b2ffad6c234be0cc1afa3d67f160cc3b
                                                                                                                                                                                                                                            • Instruction ID: 697f2f391c1b6108d36f96d29e07087026614b21abfa2262b266196be4a2461e
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: fac8c8204e0fe19e7a885f1839b95069b2ffad6c234be0cc1afa3d67f160cc3b
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 5961C4B16061069BDB04DF14CA81AFABBA0AB44B44B20A415F846FB6D3DB35ED45FF42
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetSysColor.USER32(00000012), ref: 00ED7421
                                                                                                                                                                                                                                            • SetTextColor.GDI32(?,?), ref: 00ED7425
                                                                                                                                                                                                                                            • GetSysColorBrush.USER32(0000000F), ref: 00ED743B
                                                                                                                                                                                                                                            • GetSysColor.USER32(0000000F), ref: 00ED7446
                                                                                                                                                                                                                                            • CreateSolidBrush.GDI32(?), ref: 00ED744B
                                                                                                                                                                                                                                            • GetSysColor.USER32(00000011), ref: 00ED7463
                                                                                                                                                                                                                                            • CreatePen.GDI32(00000000,00000001,00743C00), ref: 00ED7471
                                                                                                                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 00ED7482
                                                                                                                                                                                                                                            • SetBkColor.GDI32(?,00000000), ref: 00ED748B
                                                                                                                                                                                                                                            • SelectObject.GDI32(?,?), ref: 00ED7498
                                                                                                                                                                                                                                            • InflateRect.USER32(?,000000FF,000000FF), ref: 00ED74B7
                                                                                                                                                                                                                                            • RoundRect.GDI32(?,?,?,?,?,00000005,00000005), ref: 00ED74CE
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(00000000,000000F0), ref: 00ED74DB
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,0000000E,00000000,00000000), ref: 00ED752A
                                                                                                                                                                                                                                            • GetWindowTextW.USER32(00000000,00000000,00000001), ref: 00ED7554
                                                                                                                                                                                                                                            • InflateRect.USER32(?,000000FD,000000FD), ref: 00ED7572
                                                                                                                                                                                                                                            • DrawFocusRect.USER32(?,?), ref: 00ED757D
                                                                                                                                                                                                                                            • GetSysColor.USER32(00000011), ref: 00ED758E
                                                                                                                                                                                                                                            • SetTextColor.GDI32(?,00000000), ref: 00ED7596
                                                                                                                                                                                                                                            • DrawTextW.USER32(?,00ED70F5,000000FF,?,00000000), ref: 00ED75A8
                                                                                                                                                                                                                                            • SelectObject.GDI32(?,?), ref: 00ED75BF
                                                                                                                                                                                                                                            • DeleteObject.GDI32(?), ref: 00ED75CA
                                                                                                                                                                                                                                            • SelectObject.GDI32(?,?), ref: 00ED75D0
                                                                                                                                                                                                                                            • DeleteObject.GDI32(?), ref: 00ED75D5
                                                                                                                                                                                                                                            • SetTextColor.GDI32(?,?), ref: 00ED75DB
                                                                                                                                                                                                                                            • SetBkColor.GDI32(?,?), ref: 00ED75E5
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Color$Object$Text$RectSelect$BrushCreateDeleteDrawInflateWindow$FocusLongMessageRoundSendSolid
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1996641542-0
                                                                                                                                                                                                                                            • Opcode ID: e8c990a541a35bae223c7035e113df9bf79fcd8793db5953f899e787029f5eca
                                                                                                                                                                                                                                            • Instruction ID: 7b3e91065f736fb192d551bc820d4e2502216e8e63f0c4017f3366ea38885848
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: e8c990a541a35bae223c7035e113df9bf79fcd8793db5953f899e787029f5eca
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 05617E72901219AFDF019FA5EC49EEEBFB9EB08360F204116F915BB2A1D7709941CB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetCursorPos.USER32(?), ref: 00ED1128
                                                                                                                                                                                                                                            • GetDesktopWindow.USER32 ref: 00ED113D
                                                                                                                                                                                                                                            • GetWindowRect.USER32(00000000), ref: 00ED1144
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00ED1199
                                                                                                                                                                                                                                            • DestroyWindow.USER32(?), ref: 00ED11B9
                                                                                                                                                                                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,7FFFFFFD,80000000,80000000,80000000,80000000,00000000,00000000,00000000,00000000), ref: 00ED11ED
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00ED120B
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00ED121D
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000421,?,?), ref: 00ED1232
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,0000041D,00000000,00000000), ref: 00ED1245
                                                                                                                                                                                                                                            • IsWindowVisible.USER32(00000000), ref: 00ED12A1
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000412,00000000,D8F0D8F0), ref: 00ED12BC
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000411,00000001,00000030), ref: 00ED12D0
                                                                                                                                                                                                                                            • GetWindowRect.USER32(00000000,?), ref: 00ED12E8
                                                                                                                                                                                                                                            • MonitorFromPoint.USER32(?,?,00000002), ref: 00ED130E
                                                                                                                                                                                                                                            • GetMonitorInfoW.USER32(00000000,?), ref: 00ED1328
                                                                                                                                                                                                                                            • CopyRect.USER32(?,?), ref: 00ED133F
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000412,00000000), ref: 00ED13AA
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSendWindow$Rect$Monitor$CopyCreateCursorDesktopDestroyFromInfoLongPointVisible
                                                                                                                                                                                                                                            • String ID: ($0$tooltips_class32
                                                                                                                                                                                                                                            • API String ID: 698492251-4156429822
                                                                                                                                                                                                                                            • Opcode ID: 77575c93e99b111f8decd8eba502c17c7378c6b4bc3189c95f24cfa1fa4e4881
                                                                                                                                                                                                                                            • Instruction ID: da723d3c6420e06c84cacd83655ebf8bbdd0553d6d8445937e901d0932896e4e
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 77575c93e99b111f8decd8eba502c17c7378c6b4bc3189c95f24cfa1fa4e4881
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: DDB19C71608341AFD700DF65D884B6BFBE4FF88744F00995AF999AB2A1C731E845CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E58968
                                                                                                                                                                                                                                            • GetSystemMetrics.USER32(00000007), ref: 00E58970
                                                                                                                                                                                                                                            • SystemParametersInfoW.USER32(00000030,00000000,000000FF,00000000), ref: 00E5899B
                                                                                                                                                                                                                                            • GetSystemMetrics.USER32(00000008), ref: 00E589A3
                                                                                                                                                                                                                                            • GetSystemMetrics.USER32(00000004), ref: 00E589C8
                                                                                                                                                                                                                                            • SetRect.USER32(000000FF,00000000,00000000,000000FF,000000FF), ref: 00E589E5
                                                                                                                                                                                                                                            • AdjustWindowRectEx.USER32(000000FF,?,00000000,?), ref: 00E589F5
                                                                                                                                                                                                                                            • CreateWindowExW.USER32(?,AutoIt v3 GUI,?,?,?,000000FF,000000FF,000000FF,?,00000000,00000000), ref: 00E58A28
                                                                                                                                                                                                                                            • SetWindowLongW.USER32(00000000,000000EB,00000000), ref: 00E58A3C
                                                                                                                                                                                                                                            • GetClientRect.USER32(00000000,000000FF), ref: 00E58A5A
                                                                                                                                                                                                                                            • GetStockObject.GDI32(00000011), ref: 00E58A76
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00E58A81
                                                                                                                                                                                                                                              • Part of subcall function 00E5912D: GetCursorPos.USER32(?), ref: 00E59141
                                                                                                                                                                                                                                              • Part of subcall function 00E5912D: ScreenToClient.USER32(00000000,?), ref: 00E5915E
                                                                                                                                                                                                                                              • Part of subcall function 00E5912D: GetAsyncKeyState.USER32(00000001), ref: 00E59183
                                                                                                                                                                                                                                              • Part of subcall function 00E5912D: GetAsyncKeyState.USER32(00000002), ref: 00E5919D
                                                                                                                                                                                                                                            • SetTimer.USER32(00000000,00000000,00000028,00E590FC), ref: 00E58AA8
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: System$MetricsRectWindow$AsyncClientInfoParametersState$AdjustCreateCursorLongMessageObjectScreenSendStockTimer
                                                                                                                                                                                                                                            • String ID: AutoIt v3 GUI
                                                                                                                                                                                                                                            • API String ID: 1458621304-248962490
                                                                                                                                                                                                                                            • Opcode ID: 946b04e1571a1c5811f008c24649b27daea8bc641e72b9adfd3104164745c8f0
                                                                                                                                                                                                                                            • Instruction ID: 73f8f8ee1e6f29df2936b7f1b377a37e27838e6dc3b269f5826552ca37b6aa5a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 946b04e1571a1c5811f008c24649b27daea8bc641e72b9adfd3104164745c8f0
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 5FB17831A0020A9FDF14DFA8D945BEA3BB5FB48355F11962AFA15BB290DB30E845CB50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EA10F9: GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00EA1114
                                                                                                                                                                                                                                              • Part of subcall function 00EA10F9: GetLastError.KERNEL32(?,00000000,00000000,?,?,00EA0B9B,?,?,?), ref: 00EA1120
                                                                                                                                                                                                                                              • Part of subcall function 00EA10F9: GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00EA0B9B,?,?,?), ref: 00EA112F
                                                                                                                                                                                                                                              • Part of subcall function 00EA10F9: HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00EA0B9B,?,?,?), ref: 00EA1136
                                                                                                                                                                                                                                              • Part of subcall function 00EA10F9: GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00EA114D
                                                                                                                                                                                                                                            • GetSecurityDescriptorDacl.ADVAPI32(?,?,?,?), ref: 00EA0DF5
                                                                                                                                                                                                                                            • GetAclInformation.ADVAPI32(?,?,0000000C,00000002), ref: 00EA0E29
                                                                                                                                                                                                                                            • GetLengthSid.ADVAPI32(?), ref: 00EA0E40
                                                                                                                                                                                                                                            • GetAce.ADVAPI32(?,00000000,?), ref: 00EA0E7A
                                                                                                                                                                                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,?,?), ref: 00EA0E96
                                                                                                                                                                                                                                            • GetLengthSid.ADVAPI32(?), ref: 00EA0EAD
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000008,00000008), ref: 00EA0EB5
                                                                                                                                                                                                                                            • HeapAlloc.KERNEL32(00000000), ref: 00EA0EBC
                                                                                                                                                                                                                                            • GetLengthSid.ADVAPI32(?,00000008,?), ref: 00EA0EDD
                                                                                                                                                                                                                                            • CopySid.ADVAPI32(00000000), ref: 00EA0EE4
                                                                                                                                                                                                                                            • AddAce.ADVAPI32(?,00000002,000000FF,00000000,?), ref: 00EA0F13
                                                                                                                                                                                                                                            • SetSecurityDescriptorDacl.ADVAPI32(?,00000001,?,00000000), ref: 00EA0F35
                                                                                                                                                                                                                                            • SetUserObjectSecurity.USER32(?,00000004,?), ref: 00EA0F47
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EA0F6E
                                                                                                                                                                                                                                            • HeapFree.KERNEL32(00000000), ref: 00EA0F75
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EA0F7E
                                                                                                                                                                                                                                            • HeapFree.KERNEL32(00000000), ref: 00EA0F85
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EA0F8E
                                                                                                                                                                                                                                            • HeapFree.KERNEL32(00000000), ref: 00EA0F95
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00EA0FA1
                                                                                                                                                                                                                                            • HeapFree.KERNEL32(00000000), ref: 00EA0FA8
                                                                                                                                                                                                                                              • Part of subcall function 00EA1193: GetProcessHeap.KERNEL32(00000008,00EA0BB1,?,00000000,?,00EA0BB1,?), ref: 00EA11A1
                                                                                                                                                                                                                                              • Part of subcall function 00EA1193: HeapAlloc.KERNEL32(00000000,?,00000000,?,00EA0BB1,?), ref: 00EA11A8
                                                                                                                                                                                                                                              • Part of subcall function 00EA1193: InitializeSecurityDescriptor.ADVAPI32(00000000,00000001,?,00000000,?,00EA0BB1,?), ref: 00EA11B7
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Heap$Process$Security$Free$AllocDescriptorLengthObjectUser$Dacl$CopyErrorInformationInitializeLast
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 4175595110-0
                                                                                                                                                                                                                                            • Opcode ID: 29a3ac5c173e3f594fb304f76c91bee8de59c3c3314ea47b540e777d058b093a
                                                                                                                                                                                                                                            • Instruction ID: 16fbed68407c8c04fae7a95c7b455eb0cf3460c74a471ad37adb8cd05d57456c
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 29a3ac5c173e3f594fb304f76c91bee8de59c3c3314ea47b540e777d058b093a
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 8E717F75A0121AEFDF209FA5EC44BAEBBB8FF09345F148116F915BA191D730A905CB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00ECC4BD
                                                                                                                                                                                                                                            • RegCreateKeyExW.ADVAPI32(?,?,00000000,00EDCC08,00000000,?,00000000,?,?), ref: 00ECC544
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(00000000,00000000,00000000), ref: 00ECC5A4
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ECC5F4
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ECC66F
                                                                                                                                                                                                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000001,?,?), ref: 00ECC6B2
                                                                                                                                                                                                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000007,?,?), ref: 00ECC7C1
                                                                                                                                                                                                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,0000000B,?,00000008), ref: 00ECC84D
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 00ECC881
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00ECC88E
                                                                                                                                                                                                                                            • RegSetValueExW.ADVAPI32(00000001,?,00000000,00000003,00000000,00000000), ref: 00ECC960
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Value$Close$_wcslen$ConnectCreateRegistry
                                                                                                                                                                                                                                            • String ID: REG_BINARY$REG_DWORD$REG_EXPAND_SZ$REG_MULTI_SZ$REG_QWORD$REG_SZ
                                                                                                                                                                                                                                            • API String ID: 9721498-966354055
                                                                                                                                                                                                                                            • Opcode ID: 257599cc8210f3db3f5cbd79b62efab06609d011528b9fcd8ebbd6248926d4c6
                                                                                                                                                                                                                                            • Instruction ID: d19c3d68e5046ad5af4452db1188b4be7f871359e62b27b8531d50cdd2cce932
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 257599cc8210f3db3f5cbd79b62efab06609d011528b9fcd8ebbd6248926d4c6
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 421258756042019FDB14DF14D981F2AB7E5EF88714F14985DF88AAB2A2DB35FC42CB81
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CharUpperBuffW.USER32(?,?), ref: 00ED09C6
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ED0A01
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00ED0A54
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ED0A8A
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ED0B06
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ED0B81
                                                                                                                                                                                                                                              • Part of subcall function 00E5F9F2: _wcslen.LIBCMT ref: 00E5F9FD
                                                                                                                                                                                                                                              • Part of subcall function 00EA2BE8: SendMessageW.USER32(?,0000110A,00000009,00000000), ref: 00EA2BFA
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen$MessageSend$BuffCharUpper
                                                                                                                                                                                                                                            • String ID: CHECK$COLLAPSE$EXISTS$EXPAND$GETITEMCOUNT$GETSELECTED$GETTEXT$GETTOTALCOUNT$ISCHECKED$SELECT$UNCHECK
                                                                                                                                                                                                                                            • API String ID: 1103490817-4258414348
                                                                                                                                                                                                                                            • Opcode ID: 322b61fa44fd1eb41f2c29b5514e0b887b756f3fdc3d3aa6bc557a8a5a56c23d
                                                                                                                                                                                                                                            • Instruction ID: 59977e36a3b3fb5cc884f906914e8222ba72c78ddf761ae62fc1f5816673bdd2
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 322b61fa44fd1eb41f2c29b5514e0b887b756f3fdc3d3aa6bc557a8a5a56c23d
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: DDE15C316087019FC714DF24C450A6AB7E2FF98318F18595EF8966B3A2D731ED46DB81
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                            • String ID: HKCC$HKCR$HKCU$HKEY_CLASSES_ROOT$HKEY_CURRENT_CONFIG$HKEY_CURRENT_USER$HKEY_LOCAL_MACHINE$HKEY_USERS$HKLM$HKU
                                                                                                                                                                                                                                            • API String ID: 1256254125-909552448
                                                                                                                                                                                                                                            • Opcode ID: 3a31276eab0cf72c76dda2a4f92c78e69c1d00d5436ed6bf87cbc5fea8913ee1
                                                                                                                                                                                                                                            • Instruction ID: 1f6345e48e902dd0a2c0449419dd776b1305353a85f2916a2679c3acba92258d
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 3a31276eab0cf72c76dda2a4f92c78e69c1d00d5436ed6bf87cbc5fea8913ee1
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 3571EA32A0052A8BCB10DE7CDA41FBB73919BA4758B35252CFC5EB7285E632DD46D350
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ED835A
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ED836E
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ED8391
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ED83B4
                                                                                                                                                                                                                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00002010), ref: 00ED83F2
                                                                                                                                                                                                                                            • LoadLibraryExW.KERNEL32(?,00000000,00000032,?,?,00000001,?,?,?,00ED361A,?), ref: 00ED844E
                                                                                                                                                                                                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00ED8487
                                                                                                                                                                                                                                            • LoadImageW.USER32(00000000,?,00000001,?,?,00000000), ref: 00ED84CA
                                                                                                                                                                                                                                            • LoadImageW.USER32(?,?,00000001,?,?,00000000), ref: 00ED8501
                                                                                                                                                                                                                                            • FreeLibrary.KERNEL32(?), ref: 00ED850D
                                                                                                                                                                                                                                            • ExtractIconExW.SHELL32(?,00000000,00000000,00000000,00000001), ref: 00ED851D
                                                                                                                                                                                                                                            • DestroyIcon.USER32(?), ref: 00ED852C
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000170,00000000,00000000), ref: 00ED8549
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000064,00000172,00000001), ref: 00ED8555
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Load$Image_wcslen$IconLibraryMessageSend$DestroyExtractFree
                                                                                                                                                                                                                                            • String ID: .dll$.exe$.icl
                                                                                                                                                                                                                                            • API String ID: 799131459-1154884017
                                                                                                                                                                                                                                            • Opcode ID: 4db1fb0400f97f3093d8ea484c7ccd6c2d8cfbb42ba5bee7f5ee0f8e2bd59adc
                                                                                                                                                                                                                                            • Instruction ID: 556a943fe3b21afc1117bc1a1e963ad7e1c92e7f77b652010cc43b7539b83df5
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 4db1fb0400f97f3093d8ea484c7ccd6c2d8cfbb42ba5bee7f5ee0f8e2bd59adc
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 29610171940216BEEB14DF64ED41BBF77A8FB04B51F10560AF815F62D0DB74A981C7A0
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID: "$#OnAutoItStartRegister$#ce$#comments-end$#comments-start$#cs$#include$#include-once$#notrayicon$#pragma compile$#requireadmin$'$Bad directive syntax error$Cannot parse #include$Unterminated group of comments
                                                                                                                                                                                                                                            • API String ID: 0-1645009161
                                                                                                                                                                                                                                            • Opcode ID: 91a1e57bb0d53c115e29a6b3878120dbc59107207662743271f3de4d8d1e01a1
                                                                                                                                                                                                                                            • Instruction ID: 35380326381e831f8450b4f25175fd647433452b2d318bee3166df6c9ebf3f1e
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 91a1e57bb0d53c115e29a6b3878120dbc59107207662743271f3de4d8d1e01a1
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: CD811471A40605BBDB20AF60EC46FAE77A8EF14340F006426F949BA292EF71D911C7D1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CharLowerBuffW.USER32(?,?), ref: 00EB3EF8
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EB3F03
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EB3F5A
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EB3F98
                                                                                                                                                                                                                                            • GetDriveTypeW.KERNEL32(?), ref: 00EB3FD6
                                                                                                                                                                                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EB401E
                                                                                                                                                                                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EB4059
                                                                                                                                                                                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EB4087
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: SendString_wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                            • String ID: type cdaudio alias cd wait$ wait$close$close cd wait$closed$open$open $set cd door
                                                                                                                                                                                                                                            • API String ID: 1839972693-4113822522
                                                                                                                                                                                                                                            • Opcode ID: 5e8d943e75a26f0cc183160a9b490d223f1991654b52991d170bc694528945b5
                                                                                                                                                                                                                                            • Instruction ID: 00e39425e9d7342ab6ecac960cbac45fe1e18ed59e5c3ae631c7ea30f12e09e5
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 5e8d943e75a26f0cc183160a9b490d223f1991654b52991d170bc694528945b5
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7B71D271A042129FC310EF34D8818ABB7F4EF94758F10592DF995A7292EB31ED45CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • LoadIconW.USER32(00000063), ref: 00EA5A2E
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000080,00000000,00000000), ref: 00EA5A40
                                                                                                                                                                                                                                            • SetWindowTextW.USER32(?,?), ref: 00EA5A57
                                                                                                                                                                                                                                            • GetDlgItem.USER32(?,000003EA), ref: 00EA5A6C
                                                                                                                                                                                                                                            • SetWindowTextW.USER32(00000000,?), ref: 00EA5A72
                                                                                                                                                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00EA5A82
                                                                                                                                                                                                                                            • SetWindowTextW.USER32(00000000,?), ref: 00EA5A88
                                                                                                                                                                                                                                            • SendDlgItemMessageW.USER32(?,000003E9,000000CC,?,00000000), ref: 00EA5AA9
                                                                                                                                                                                                                                            • SendDlgItemMessageW.USER32(?,000003E9,000000C5,00000000,00000000), ref: 00EA5AC3
                                                                                                                                                                                                                                            • GetWindowRect.USER32(?,?), ref: 00EA5ACC
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EA5B33
                                                                                                                                                                                                                                            • SetWindowTextW.USER32(?,?), ref: 00EA5B6F
                                                                                                                                                                                                                                            • GetDesktopWindow.USER32 ref: 00EA5B75
                                                                                                                                                                                                                                            • GetWindowRect.USER32(00000000), ref: 00EA5B7C
                                                                                                                                                                                                                                            • MoveWindow.USER32(?,?,00000080,00000000,?,00000000), ref: 00EA5BD3
                                                                                                                                                                                                                                            • GetClientRect.USER32(?,?), ref: 00EA5BE0
                                                                                                                                                                                                                                            • PostMessageW.USER32(?,00000005,00000000,?), ref: 00EA5C05
                                                                                                                                                                                                                                            • SetTimer.USER32(?,0000040A,00000000,00000000), ref: 00EA5C2F
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$ItemMessageText$RectSend$ClientDesktopIconLoadMovePostTimer_wcslen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 895679908-0
                                                                                                                                                                                                                                            • Opcode ID: 37967337e00b6ad85399e146e7dc868ce6400c0fd4516819e6ea086952a6141b
                                                                                                                                                                                                                                            • Instruction ID: d5a49b9c2243cad6ee555788137c7efecbb871d2d7ca1f1d6c92504dd7213151
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 37967337e00b6ad85399e146e7dc868ce6400c0fd4516819e6ea086952a6141b
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: AB718F32A00B09AFDB20DFA9CE45AAEBBF5FF48705F105519E152B65A0D774F904CB20
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F89), ref: 00EBFE27
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F8A), ref: 00EBFE32
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F00), ref: 00EBFE3D
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F03), ref: 00EBFE48
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F8B), ref: 00EBFE53
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F01), ref: 00EBFE5E
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F81), ref: 00EBFE69
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F88), ref: 00EBFE74
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F80), ref: 00EBFE7F
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F86), ref: 00EBFE8A
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F83), ref: 00EBFE95
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F85), ref: 00EBFEA0
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F82), ref: 00EBFEAB
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F84), ref: 00EBFEB6
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F04), ref: 00EBFEC1
                                                                                                                                                                                                                                            • LoadCursorW.USER32(00000000,00007F02), ref: 00EBFECC
                                                                                                                                                                                                                                            • GetCursorInfo.USER32(?), ref: 00EBFEDC
                                                                                                                                                                                                                                            • GetLastError.KERNEL32 ref: 00EBFF1E
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Cursor$Load$ErrorInfoLast
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3215588206-0
                                                                                                                                                                                                                                            • Opcode ID: e0e9008c97eb65a0a315d0579e7e3f9520d83c3d2be3caec7262159d270246d3
                                                                                                                                                                                                                                            • Instruction ID: b29a9e28769719299e68671fae57a3b997fb45f30db6980a55ac2dbcd2fb1eab
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: e0e9008c97eb65a0a315d0579e7e3f9520d83c3d2be3caec7262159d270246d3
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C34152B0E053196ADB109FBA9C8986EBFE8FF04754B50452AE11DE7281DB78E901CE91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • __scrt_initialize_thread_safe_statics_platform_specific.LIBCMT ref: 00E600C6
                                                                                                                                                                                                                                              • Part of subcall function 00E600ED: InitializeCriticalSectionAndSpinCount.KERNEL32(00F1070C,00000FA0,6D933254,?,?,?,?,00E823B3,000000FF), ref: 00E6011C
                                                                                                                                                                                                                                              • Part of subcall function 00E600ED: GetModuleHandleW.KERNEL32(api-ms-win-core-synch-l1-2-0.dll,?,?,?,?,00E823B3,000000FF), ref: 00E60127
                                                                                                                                                                                                                                              • Part of subcall function 00E600ED: GetModuleHandleW.KERNEL32(kernel32.dll,?,?,?,?,00E823B3,000000FF), ref: 00E60138
                                                                                                                                                                                                                                              • Part of subcall function 00E600ED: GetProcAddress.KERNEL32(00000000,InitializeConditionVariable), ref: 00E6014E
                                                                                                                                                                                                                                              • Part of subcall function 00E600ED: GetProcAddress.KERNEL32(00000000,SleepConditionVariableCS), ref: 00E6015C
                                                                                                                                                                                                                                              • Part of subcall function 00E600ED: GetProcAddress.KERNEL32(00000000,WakeAllConditionVariable), ref: 00E6016A
                                                                                                                                                                                                                                              • Part of subcall function 00E600ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00E60195
                                                                                                                                                                                                                                              • Part of subcall function 00E600ED: __crt_fast_encode_pointer.LIBVCRUNTIME ref: 00E601A0
                                                                                                                                                                                                                                            • ___scrt_fastfail.LIBCMT ref: 00E600E7
                                                                                                                                                                                                                                              • Part of subcall function 00E600A3: __onexit.LIBCMT ref: 00E600A9
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            • kernel32.dll, xrefs: 00E60133
                                                                                                                                                                                                                                            • WakeAllConditionVariable, xrefs: 00E60162
                                                                                                                                                                                                                                            • SleepConditionVariableCS, xrefs: 00E60154
                                                                                                                                                                                                                                            • api-ms-win-core-synch-l1-2-0.dll, xrefs: 00E60122
                                                                                                                                                                                                                                            • InitializeConditionVariable, xrefs: 00E60148
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: AddressProc$HandleModule__crt_fast_encode_pointer$CountCriticalInitializeSectionSpin___scrt_fastfail__onexit__scrt_initialize_thread_safe_statics_platform_specific
                                                                                                                                                                                                                                            • String ID: InitializeConditionVariable$SleepConditionVariableCS$WakeAllConditionVariable$api-ms-win-core-synch-l1-2-0.dll$kernel32.dll
                                                                                                                                                                                                                                            • API String ID: 66158676-1714406822
                                                                                                                                                                                                                                            • Opcode ID: a7645e602b5c32d63f77dcf0cb2204b227bd1783a8071797e39ed93401b418ba
                                                                                                                                                                                                                                            • Instruction ID: 3e7d46bf459501383869cd68b77511736f2309d770a671cf2e9054a1c1f2cc77
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a7645e602b5c32d63f77dcf0cb2204b227bd1783a8071797e39ed93401b418ba
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2121F9326867266FD7105BA5BC06B6B33E5DB06BE1F10552BF902F32D1DFA09804CA91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen
                                                                                                                                                                                                                                            • String ID: CLASS$CLASSNN$INSTANCE$NAME$REGEXPCLASS$TEXT
                                                                                                                                                                                                                                            • API String ID: 176396367-1603158881
                                                                                                                                                                                                                                            • Opcode ID: 349e6b88fbb4a2462886f3a671c6634c9a5a465f506f4ee1a77295b9269de164
                                                                                                                                                                                                                                            • Instruction ID: c0234be5378886f56790b59e41c73248ef3c9f871bc5a810344fa9b7e6e263bf
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 349e6b88fbb4a2462886f3a671c6634c9a5a465f506f4ee1a77295b9269de164
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4FE1E431A005169BCB189FB8C4517EEFBB0BF5E754F14A119F466BB240DB30BE899B90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CharLowerBuffW.USER32(00000000,00000000,00EDCC08), ref: 00EB4527
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EB453B
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EB4599
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EB45F4
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EB463F
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EB46A7
                                                                                                                                                                                                                                              • Part of subcall function 00E5F9F2: _wcslen.LIBCMT ref: 00E5F9FD
                                                                                                                                                                                                                                            • GetDriveTypeW.KERNEL32(?,00F06BF0,00000061), ref: 00EB4743
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen$BuffCharDriveLowerType
                                                                                                                                                                                                                                            • String ID: all$cdrom$fixed$network$ramdisk$removable$unknown
                                                                                                                                                                                                                                            • API String ID: 2055661098-1000479233
                                                                                                                                                                                                                                            • Opcode ID: 9279262e0fd6c007970a37ecfd89a055c6e3e4dff292c85e71ef11102b56c231
                                                                                                                                                                                                                                            • Instruction ID: 55f69feb1f740363d48bc1a0a36ea8ab85d7af3c303d7d6969fe606b4a92affb
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9279262e0fd6c007970a37ecfd89a055c6e3e4dff292c85e71ef11102b56c231
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9CB112B16083029FC710DF28D890AABB7E5AFA5764F50691DF496E72D2DB30D844CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,00EDCC08), ref: 00EC40BB
                                                                                                                                                                                                                                            • GetProcAddress.KERNEL32(00000000,GetModuleHandleExW), ref: 00EC40CD
                                                                                                                                                                                                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,?,?,?,00EDCC08), ref: 00EC40F2
                                                                                                                                                                                                                                            • FreeLibrary.KERNEL32(00000000,?,00EDCC08), ref: 00EC413E
                                                                                                                                                                                                                                            • StringFromGUID2.OLE32(?,?,00000028,?,00EDCC08), ref: 00EC41A8
                                                                                                                                                                                                                                            • SysFreeString.OLEAUT32(00000009), ref: 00EC4262
                                                                                                                                                                                                                                            • QueryPathOfRegTypeLib.OLEAUT32(?,?,?,?,?), ref: 00EC42C8
                                                                                                                                                                                                                                            • SysFreeString.OLEAUT32(?), ref: 00EC42F2
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: FreeString$Library$AddressFileFromLoadModuleNamePathProcQueryType
                                                                                                                                                                                                                                            • String ID: GetModuleHandleExW$kernel32.dll
                                                                                                                                                                                                                                            • API String ID: 354098117-199464113
                                                                                                                                                                                                                                            • Opcode ID: 22f43ac5a12cd3a1b3b3199ab6afb6ab910d9a6a85baa618e68953da5dc23623
                                                                                                                                                                                                                                            • Instruction ID: 2b7ab5c10520ee3fbf9a1bd894b1bcdbf729e91b122d3f1403002f1ffd4b72a4
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 22f43ac5a12cd3a1b3b3199ab6afb6ab910d9a6a85baa618e68953da5dc23623
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 3B125BB5A00105EFDB14DF54C994FAEB7B5FF84318F249098E915AB291C732ED46CBA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetMenuItemCount.USER32(00F11990), ref: 00E82F8D
                                                                                                                                                                                                                                            • GetMenuItemCount.USER32(00F11990), ref: 00E8303D
                                                                                                                                                                                                                                            • GetCursorPos.USER32(?), ref: 00E83081
                                                                                                                                                                                                                                            • SetForegroundWindow.USER32(00000000), ref: 00E8308A
                                                                                                                                                                                                                                            • TrackPopupMenuEx.USER32(00F11990,00000000,?,00000000,00000000,00000000), ref: 00E8309D
                                                                                                                                                                                                                                            • PostMessageW.USER32(00000000,00000000,00000000,00000000), ref: 00E830A9
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Menu$CountItem$CursorForegroundMessagePopupPostTrackWindow
                                                                                                                                                                                                                                            • String ID: 0
                                                                                                                                                                                                                                            • API String ID: 36266755-4108050209
                                                                                                                                                                                                                                            • Opcode ID: 6f164dd52aed0b3e7601628cc9ed6417e7de630f25505cd46ec22d9d7ac19796
                                                                                                                                                                                                                                            • Instruction ID: 7a9a8a011d81d02838b951551ba85c51959b5acc6c36ef0ce773a54ed75871d3
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 6f164dd52aed0b3e7601628cc9ed6417e7de630f25505cd46ec22d9d7ac19796
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4C712730640206BEEB219F75DC49FAABF68FF05768F205206F62C7A1E1C7B1A914DB54
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • DestroyWindow.USER32(00000000,?), ref: 00ED6DEB
                                                                                                                                                                                                                                              • Part of subcall function 00E46B57: _wcslen.LIBCMT ref: 00E46B6A
                                                                                                                                                                                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00000000,?), ref: 00ED6E5F
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000433,00000000,00000030), ref: 00ED6E81
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00ED6E94
                                                                                                                                                                                                                                            • DestroyWindow.USER32(?), ref: 00ED6EB5
                                                                                                                                                                                                                                            • CreateWindowExW.USER32(00000008,tooltips_class32,00000000,?,80000000,80000000,80000000,80000000,?,00000000,00E40000,00000000), ref: 00ED6EE4
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000432,00000000,00000030), ref: 00ED6EFD
                                                                                                                                                                                                                                            • GetDesktopWindow.USER32 ref: 00ED6F16
                                                                                                                                                                                                                                            • GetWindowRect.USER32(00000000), ref: 00ED6F1D
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000418,00000000,?), ref: 00ED6F35
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000421,?,00000000), ref: 00ED6F4D
                                                                                                                                                                                                                                              • Part of subcall function 00E59944: GetWindowLongW.USER32(?,000000EB), ref: 00E59952
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$MessageSend$CreateDestroy$DesktopLongRect_wcslen
                                                                                                                                                                                                                                            • String ID: 0$tooltips_class32
                                                                                                                                                                                                                                            • API String ID: 2429346358-3619404913
                                                                                                                                                                                                                                            • Opcode ID: cbef19aa3a87c2214e867928736868d2d434d86ec1de6e009b074adb13ef6e0c
                                                                                                                                                                                                                                            • Instruction ID: 1e43ce2644ea6f63cd23bad9fbe59453255449de5e3d6564f9c703f7b1bb78e3
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: cbef19aa3a87c2214e867928736868d2d434d86ec1de6e009b074adb13ef6e0c
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2E718B70204245AFDB21CF18DC44EAABBF9FB89708F54541EF999A7361C770E90ADB12
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E59BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E59BB2
                                                                                                                                                                                                                                            • DragQueryPoint.SHELL32(?,?), ref: 00ED9147
                                                                                                                                                                                                                                              • Part of subcall function 00ED7674: ClientToScreen.USER32(?,?), ref: 00ED769A
                                                                                                                                                                                                                                              • Part of subcall function 00ED7674: GetWindowRect.USER32(?,?), ref: 00ED7710
                                                                                                                                                                                                                                              • Part of subcall function 00ED7674: PtInRect.USER32(?,?,00ED8B89), ref: 00ED7720
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00ED91B0
                                                                                                                                                                                                                                            • DragQueryFileW.SHELL32(?,000000FF,00000000,00000000), ref: 00ED91BB
                                                                                                                                                                                                                                            • DragQueryFileW.SHELL32(?,00000000,?,00000104), ref: 00ED91DE
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000000C2,00000001,?), ref: 00ED9225
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00ED923E
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 00ED9255
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000000B1,?,?), ref: 00ED9277
                                                                                                                                                                                                                                            • DragFinish.SHELL32(?), ref: 00ED927E
                                                                                                                                                                                                                                            • DefDlgProcW.USER32(?,00000233,?,00000000,?,?,?), ref: 00ED9371
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$Drag$Query$FileRectWindow$ClientFinishLongPointProcScreen
                                                                                                                                                                                                                                            • String ID: @GUI_DRAGFILE$@GUI_DRAGID$@GUI_DROPID
                                                                                                                                                                                                                                            • API String ID: 221274066-3440237614
                                                                                                                                                                                                                                            • Opcode ID: 5ee885da093f8bf8c6aad13e050561aaf9292866d6ecaf37e836697b27ad8586
                                                                                                                                                                                                                                            • Instruction ID: b2c69659bdd4815b81c42efd767a75b4526a7afe87e89616d96b9263d2be3a1f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 5ee885da093f8bf8c6aad13e050561aaf9292866d6ecaf37e836697b27ad8586
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: E2617C71108301AFD701DF55EC85DAFBBE8EF88750F50191EF5A5A32A1DB309A49CB52
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00EBC4B0
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00EBC4C3
                                                                                                                                                                                                                                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00EBC4D7
                                                                                                                                                                                                                                            • HttpOpenRequestW.WININET(00000000,00000000,?,00000000,00000000,00000000,?,00000000), ref: 00EBC4F0
                                                                                                                                                                                                                                            • InternetQueryOptionW.WININET(00000000,0000001F,?,?), ref: 00EBC533
                                                                                                                                                                                                                                            • InternetSetOptionW.WININET(00000000,0000001F,00000100,00000004), ref: 00EBC549
                                                                                                                                                                                                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00EBC554
                                                                                                                                                                                                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00EBC584
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(?,00000003,?,?,?,?,?,?), ref: 00EBC5DC
                                                                                                                                                                                                                                            • SetEvent.KERNEL32(?,?,00000003,?,?,?,?,?,?), ref: 00EBC5F0
                                                                                                                                                                                                                                            • InternetCloseHandle.WININET(00000000), ref: 00EBC5FB
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Internet$Http$ErrorEventLastOptionQueryRequest$CloseConnectHandleInfoOpenSend
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3800310941-3916222277
                                                                                                                                                                                                                                            • Opcode ID: 5347f39de38aadec8f766a28d7e098bec8ceb16b7426ce7b4ab496769733773b
                                                                                                                                                                                                                                            • Instruction ID: ba4c642f51cca2e5588d567d9bb1f1a174c80fd78523b2413672bf95ae157614
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 5347f39de38aadec8f766a28d7e098bec8ceb16b7426ce7b4ab496769733773b
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: F6516FB0505609BFDB218F61D988AEB7BFCFF08788F20541AF945E6110DB30E948DB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CreateFileW.KERNEL32(?,80000000,00000000,00000000,00000003,00000000,00000000,?,00000000,?), ref: 00ED8592
                                                                                                                                                                                                                                            • GetFileSize.KERNEL32(00000000,00000000), ref: 00ED85A2
                                                                                                                                                                                                                                            • GlobalAlloc.KERNEL32(00000002,00000000), ref: 00ED85AD
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00ED85BA
                                                                                                                                                                                                                                            • GlobalLock.KERNEL32(00000000), ref: 00ED85C8
                                                                                                                                                                                                                                            • ReadFile.KERNEL32(00000000,00000000,00000000,?,00000000), ref: 00ED85D7
                                                                                                                                                                                                                                            • GlobalUnlock.KERNEL32(00000000), ref: 00ED85E0
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00ED85E7
                                                                                                                                                                                                                                            • CreateStreamOnHGlobal.OLE32(00000000,00000001,?), ref: 00ED85F8
                                                                                                                                                                                                                                            • OleLoadPicture.OLEAUT32(?,00000000,00000000,00EDFC38,?), ref: 00ED8611
                                                                                                                                                                                                                                            • GlobalFree.KERNEL32(00000000), ref: 00ED8621
                                                                                                                                                                                                                                            • GetObjectW.GDI32(?,00000018,000000FF), ref: 00ED8641
                                                                                                                                                                                                                                            • CopyImage.USER32(?,00000000,00000000,?,00002000), ref: 00ED8671
                                                                                                                                                                                                                                            • DeleteObject.GDI32(00000000), ref: 00ED8699
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000172,00000000,00000000), ref: 00ED86AF
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Global$File$CloseCreateHandleObject$AllocCopyDeleteFreeImageLoadLockMessagePictureReadSendSizeStreamUnlock
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3840717409-0
                                                                                                                                                                                                                                            • Opcode ID: 670f6d1d2c84e65b3ef72af4b1388a66ec853bf59af8790587e501142431052c
                                                                                                                                                                                                                                            • Instruction ID: 2b6c321261d40578cf546b029dcc050abcf2ded06488a28d6b3772cf8db8799a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 670f6d1d2c84e65b3ef72af4b1388a66ec853bf59af8790587e501142431052c
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4E415B71601205AFDB10CFA6ED48EAE7BBCEF89B55F10415AF815E72A0DB309905CB20
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • VariantInit.OLEAUT32(00000000), ref: 00EB1502
                                                                                                                                                                                                                                            • VariantCopy.OLEAUT32(?,?), ref: 00EB150B
                                                                                                                                                                                                                                            • VariantClear.OLEAUT32(?), ref: 00EB1517
                                                                                                                                                                                                                                            • VariantTimeToSystemTime.OLEAUT32(?,?,?), ref: 00EB15FB
                                                                                                                                                                                                                                            • VarR8FromDec.OLEAUT32(?,?), ref: 00EB1657
                                                                                                                                                                                                                                            • VariantInit.OLEAUT32(?), ref: 00EB1708
                                                                                                                                                                                                                                            • SysFreeString.OLEAUT32(?), ref: 00EB178C
                                                                                                                                                                                                                                            • VariantClear.OLEAUT32(?), ref: 00EB17D8
                                                                                                                                                                                                                                            • VariantClear.OLEAUT32(?), ref: 00EB17E7
                                                                                                                                                                                                                                            • VariantInit.OLEAUT32(00000000), ref: 00EB1823
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Variant$ClearInit$Time$CopyFreeFromStringSystem
                                                                                                                                                                                                                                            • String ID: %4d%02d%02d%02d%02d%02d$Default
                                                                                                                                                                                                                                            • API String ID: 1234038744-3931177956
                                                                                                                                                                                                                                            • Opcode ID: 03b1e3dda0927f4d2ecb1bfb146a1bed2c26be39c9a87ad14a19a7415f0308ce
                                                                                                                                                                                                                                            • Instruction ID: a85e244d679b2dfd034a641c4ca818b432d4472f6539c324ce85b55ae84dfb65
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 03b1e3dda0927f4d2ecb1bfb146a1bed2c26be39c9a87ad14a19a7415f0308ce
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B9D10132A01215DBCB209F65E8A4BFAB7F5BF45720FA49596F806BB180DB30DC44DB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00ECB6AE,?,?), ref: 00ECC9B5
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: _wcslen.LIBCMT ref: 00ECC9F1
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: _wcslen.LIBCMT ref: 00ECCA68
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: _wcslen.LIBCMT ref: 00ECCA9E
                                                                                                                                                                                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00ECB6F4
                                                                                                                                                                                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00ECB772
                                                                                                                                                                                                                                            • RegDeleteValueW.ADVAPI32(?,?), ref: 00ECB80A
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 00ECB87E
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 00ECB89C
                                                                                                                                                                                                                                            • LoadLibraryA.KERNEL32(advapi32.dll), ref: 00ECB8F2
                                                                                                                                                                                                                                            • GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00ECB904
                                                                                                                                                                                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00ECB922
                                                                                                                                                                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00ECB983
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00ECB994
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen$Close$DeleteLibrary$AddressBuffCharConnectFreeLoadOpenProcRegistryUpperValue
                                                                                                                                                                                                                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                            • API String ID: 146587525-4033151799
                                                                                                                                                                                                                                            • Opcode ID: 28e69333f2d53bd837c72ace5a45f4882afabce54af65d697c8a0850858645e5
                                                                                                                                                                                                                                            • Instruction ID: 0b2459d7dacb68c62ad91c213a1d5bd11992714c61284e67eb92c8903ae73645
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 28e69333f2d53bd837c72ace5a45f4882afabce54af65d697c8a0850858645e5
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 3CC1B131205201AFD714DF14D595F2ABBE5FF84308F24955CF49AAB2A2CB36EC46CB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetDC.USER32(00000000), ref: 00EC25D8
                                                                                                                                                                                                                                            • CreateCompatibleBitmap.GDI32(00000000,?,?), ref: 00EC25E8
                                                                                                                                                                                                                                            • CreateCompatibleDC.GDI32(?), ref: 00EC25F4
                                                                                                                                                                                                                                            • SelectObject.GDI32(00000000,?), ref: 00EC2601
                                                                                                                                                                                                                                            • StretchBlt.GDI32(?,00000000,00000000,?,?,?,00000006,?,?,?,00CC0020), ref: 00EC266D
                                                                                                                                                                                                                                            • GetDIBits.GDI32(?,?,00000000,00000000,00000000,00000028,00000000), ref: 00EC26AC
                                                                                                                                                                                                                                            • GetDIBits.GDI32(?,?,00000000,?,00000000,00000028,00000000), ref: 00EC26D0
                                                                                                                                                                                                                                            • SelectObject.GDI32(?,?), ref: 00EC26D8
                                                                                                                                                                                                                                            • DeleteObject.GDI32(?), ref: 00EC26E1
                                                                                                                                                                                                                                            • DeleteDC.GDI32(?), ref: 00EC26E8
                                                                                                                                                                                                                                            • ReleaseDC.USER32(00000000,?), ref: 00EC26F3
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Object$BitsCompatibleCreateDeleteSelect$BitmapReleaseStretch
                                                                                                                                                                                                                                            • String ID: (
                                                                                                                                                                                                                                            • API String ID: 2598888154-3887548279
                                                                                                                                                                                                                                            • Opcode ID: 127f3d057b7f502f7da9866cdca3deee7169c873968d2133aee33694b6c06067
                                                                                                                                                                                                                                            • Instruction ID: 51d1817580d60614511228ac0848bcc9463cab7432c81a95ad9aa78b7576db1e
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 127f3d057b7f502f7da9866cdca3deee7169c873968d2133aee33694b6c06067
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 1561D275D01219AFCB04CFA4D985EAEBBF5FF48310F20852AE955B7250D771A941CFA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • ___free_lconv_mon.LIBCMT ref: 00E7DAA1
                                                                                                                                                                                                                                              • Part of subcall function 00E7D63C: _free.LIBCMT ref: 00E7D659
                                                                                                                                                                                                                                              • Part of subcall function 00E7D63C: _free.LIBCMT ref: 00E7D66B
                                                                                                                                                                                                                                              • Part of subcall function 00E7D63C: _free.LIBCMT ref: 00E7D67D
                                                                                                                                                                                                                                              • Part of subcall function 00E7D63C: _free.LIBCMT ref: 00E7D68F
                                                                                                                                                                                                                                              • Part of subcall function 00E7D63C: _free.LIBCMT ref: 00E7D6A1
                                                                                                                                                                                                                                              • Part of subcall function 00E7D63C: _free.LIBCMT ref: 00E7D6B3
                                                                                                                                                                                                                                              • Part of subcall function 00E7D63C: _free.LIBCMT ref: 00E7D6C5
                                                                                                                                                                                                                                              • Part of subcall function 00E7D63C: _free.LIBCMT ref: 00E7D6D7
                                                                                                                                                                                                                                              • Part of subcall function 00E7D63C: _free.LIBCMT ref: 00E7D6E9
                                                                                                                                                                                                                                              • Part of subcall function 00E7D63C: _free.LIBCMT ref: 00E7D6FB
                                                                                                                                                                                                                                              • Part of subcall function 00E7D63C: _free.LIBCMT ref: 00E7D70D
                                                                                                                                                                                                                                              • Part of subcall function 00E7D63C: _free.LIBCMT ref: 00E7D71F
                                                                                                                                                                                                                                              • Part of subcall function 00E7D63C: _free.LIBCMT ref: 00E7D731
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7DA96
                                                                                                                                                                                                                                              • Part of subcall function 00E729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00E7D7D1,00000000,00000000,00000000,00000000,?,00E7D7F8,00000000,00000007,00000000,?,00E7DBF5,00000000), ref: 00E729DE
                                                                                                                                                                                                                                              • Part of subcall function 00E729C8: GetLastError.KERNEL32(00000000,?,00E7D7D1,00000000,00000000,00000000,00000000,?,00E7D7F8,00000000,00000007,00000000,?,00E7DBF5,00000000,00000000), ref: 00E729F0
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7DAB8
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7DACD
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7DAD8
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7DAFA
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7DB0D
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7DB1B
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7DB26
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7DB5E
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7DB65
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7DB82
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7DB9A
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _free$ErrorFreeHeapLast___free_lconv_mon
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 161543041-0
                                                                                                                                                                                                                                            • Opcode ID: f71ee1bc201349dab409c5880805b1165cd6324cf71382ad94946cb2a75fb368
                                                                                                                                                                                                                                            • Instruction ID: feadde61d19aaccbe3f1dc575a09e4cd389d0d3dfa909180ac1ff50bcb36c6b8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f71ee1bc201349dab409c5880805b1165cd6324cf71382ad94946cb2a75fb368
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 08314A316086059FEB21AA79EC45B5AB7F9FF40314F15E419E64DF7192DB31AC808760
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 00EA369C
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EA36A7
                                                                                                                                                                                                                                            • SendMessageTimeoutW.USER32(?,?,00000101,00000000,00000002,00001388,?), ref: 00EA3797
                                                                                                                                                                                                                                            • GetClassNameW.USER32(?,?,00000400), ref: 00EA380C
                                                                                                                                                                                                                                            • GetDlgCtrlID.USER32(?), ref: 00EA385D
                                                                                                                                                                                                                                            • GetWindowRect.USER32(?,?), ref: 00EA3882
                                                                                                                                                                                                                                            • GetParent.USER32(?), ref: 00EA38A0
                                                                                                                                                                                                                                            • ScreenToClient.USER32(00000000), ref: 00EA38A7
                                                                                                                                                                                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 00EA3921
                                                                                                                                                                                                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 00EA395D
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ClassName$Window$ClientCtrlMessageParentRectScreenSendTextTimeout_wcslen
                                                                                                                                                                                                                                            • String ID: %s%u
                                                                                                                                                                                                                                            • API String ID: 4010501982-679674701
                                                                                                                                                                                                                                            • Opcode ID: a13f3e276bff7b69fde4edbdbabc7cca029ef7357e0c7205c2dfe6d11b808528
                                                                                                                                                                                                                                            • Instruction ID: a586d54842d3cf8df8c5e428e5848ce94dc786d5f8a9064abb33481ad675f98f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a13f3e276bff7b69fde4edbdbabc7cca029ef7357e0c7205c2dfe6d11b808528
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D391D471204606AFD708DF34D885BABB7E8FF49344F105619F999EA190DB30FA45CB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetClassNameW.USER32(?,?,00000400), ref: 00EA4994
                                                                                                                                                                                                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 00EA49DA
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EA49EB
                                                                                                                                                                                                                                            • CharUpperBuffW.USER32(?,00000000), ref: 00EA49F7
                                                                                                                                                                                                                                            • _wcsstr.LIBVCRUNTIME ref: 00EA4A2C
                                                                                                                                                                                                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 00EA4A64
                                                                                                                                                                                                                                            • GetWindowTextW.USER32(?,?,00000400), ref: 00EA4A9D
                                                                                                                                                                                                                                            • GetClassNameW.USER32(00000018,?,00000400), ref: 00EA4AE6
                                                                                                                                                                                                                                            • GetClassNameW.USER32(?,?,00000400), ref: 00EA4B20
                                                                                                                                                                                                                                            • GetWindowRect.USER32(?,?), ref: 00EA4B8B
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ClassName$Window$Text$BuffCharRectUpper_wcslen_wcsstr
                                                                                                                                                                                                                                            • String ID: ThumbnailClass
                                                                                                                                                                                                                                            • API String ID: 1311036022-1241985126
                                                                                                                                                                                                                                            • Opcode ID: e3fc6295e9d86531c58c6f2f7b4109f9c5b69ffa8080b16b6aa9fc6e41a1f56f
                                                                                                                                                                                                                                            • Instruction ID: fcc3b6d302abac2956813e8fa843f1b353f47437fae51995ab024a7468d24fb5
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: e3fc6295e9d86531c58c6f2f7b4109f9c5b69ffa8080b16b6aa9fc6e41a1f56f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 8A91C1B10042059FDB04CF14D981BAAB7E8EF89758F04646AFD85AE0D6DB70FD45CBA1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetMenuItemInfoW.USER32(00F11990,000000FF,00000000,00000030), ref: 00EABFAC
                                                                                                                                                                                                                                            • SetMenuItemInfoW.USER32(00F11990,00000004,00000000,00000030), ref: 00EABFE1
                                                                                                                                                                                                                                            • Sleep.KERNEL32(000001F4), ref: 00EABFF3
                                                                                                                                                                                                                                            • GetMenuItemCount.USER32(?), ref: 00EAC039
                                                                                                                                                                                                                                            • GetMenuItemID.USER32(?,00000000), ref: 00EAC056
                                                                                                                                                                                                                                            • GetMenuItemID.USER32(?,-00000001), ref: 00EAC082
                                                                                                                                                                                                                                            • GetMenuItemID.USER32(?,?), ref: 00EAC0C9
                                                                                                                                                                                                                                            • CheckMenuRadioItem.USER32(?,00000000,?,00000000,00000400), ref: 00EAC10F
                                                                                                                                                                                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00EAC124
                                                                                                                                                                                                                                            • SetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00EAC145
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ItemMenu$Info$CheckCountRadioSleep
                                                                                                                                                                                                                                            • String ID: 0
                                                                                                                                                                                                                                            • API String ID: 1460738036-4108050209
                                                                                                                                                                                                                                            • Opcode ID: bfd4fa6f4fd5a9fb300e864c3717f7fcf844cb2fd3975e9cba2514c91a763d40
                                                                                                                                                                                                                                            • Instruction ID: bfa4e0ee036e45b507e44f299608b8abd4f9e6166adb2ba99d41ce76b4b1995c
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: bfd4fa6f4fd5a9fb300e864c3717f7fcf844cb2fd3975e9cba2514c91a763d40
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7161A370A0124AAFDF11CF64DD88AEE7BB8EB0A348F245155F911BB291C731BD04CB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00ECCC64
                                                                                                                                                                                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?,?,?,00000000), ref: 00ECCC8D
                                                                                                                                                                                                                                            • FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00ECCD48
                                                                                                                                                                                                                                              • Part of subcall function 00ECCC34: RegCloseKey.ADVAPI32(?,?,?,00000000), ref: 00ECCCAA
                                                                                                                                                                                                                                              • Part of subcall function 00ECCC34: LoadLibraryA.KERNEL32(advapi32.dll,?,?,00000000), ref: 00ECCCBD
                                                                                                                                                                                                                                              • Part of subcall function 00ECCC34: GetProcAddress.KERNEL32(00000000,RegDeleteKeyExW), ref: 00ECCCCF
                                                                                                                                                                                                                                              • Part of subcall function 00ECCC34: FreeLibrary.KERNEL32(00000000,?,?,00000000), ref: 00ECCD05
                                                                                                                                                                                                                                              • Part of subcall function 00ECCC34: RegEnumKeyExW.ADVAPI32(?,00000000,?,000000FF,00000000,00000000,00000000,?,?,?,00000000), ref: 00ECCD28
                                                                                                                                                                                                                                            • RegDeleteKeyW.ADVAPI32(?,?), ref: 00ECCCF3
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Library$EnumFree$AddressCloseDeleteLoadOpenProc
                                                                                                                                                                                                                                            • String ID: RegDeleteKeyExW$advapi32.dll
                                                                                                                                                                                                                                            • API String ID: 2734957052-4033151799
                                                                                                                                                                                                                                            • Opcode ID: 47313d79c2dce7d96feeb668c97ac6978b1055418bb5b8cca99fdbeff1f85811
                                                                                                                                                                                                                                            • Instruction ID: 142fb7362b4672e9a8a3cbdb9b361fa93c6b0d7837166fd4f75684416b5c66c0
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 47313d79c2dce7d96feeb668c97ac6978b1055418bb5b8cca99fdbeff1f85811
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 6D318671902129BFDB209B51DD88EFFBF7CEF15744F204169E90AF2140D7349A46DAA1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetFullPathNameW.KERNEL32(?,00007FFF,?,?), ref: 00EB3D40
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EB3D6D
                                                                                                                                                                                                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00EB3D9D
                                                                                                                                                                                                                                            • CreateFileW.KERNEL32(?,40000000,00000000,00000000,00000003,02200000,00000000), ref: 00EB3DBE
                                                                                                                                                                                                                                            • RemoveDirectoryW.KERNEL32(?), ref: 00EB3DCE
                                                                                                                                                                                                                                            • DeviceIoControl.KERNEL32(00000000,000900A4,?,?,00000000,00000000,?,00000000), ref: 00EB3E55
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00EB3E60
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00EB3E6B
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CloseCreateDirectoryHandle$ControlDeviceFileFullNamePathRemove_wcslen
                                                                                                                                                                                                                                            • String ID: :$\$\??\%s
                                                                                                                                                                                                                                            • API String ID: 1149970189-3457252023
                                                                                                                                                                                                                                            • Opcode ID: b12a4dadce9e92844c5b2e246ef2f6e50b35ef080561d0ce3b332c5ec0cd93c3
                                                                                                                                                                                                                                            • Instruction ID: 98b7c84c688a2347e07fb75a86ab7209d658ecbd7d825e6582c5f8c97725a8dd
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b12a4dadce9e92844c5b2e246ef2f6e50b35ef080561d0ce3b332c5ec0cd93c3
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9631A57194021AABDB209BA1DC49FEF37BDEF88744F5051A6F505F6060E7709744CB24
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • timeGetTime.WINMM ref: 00EAE6B4
                                                                                                                                                                                                                                              • Part of subcall function 00E5E551: timeGetTime.WINMM(?,?,00EAE6D4), ref: 00E5E555
                                                                                                                                                                                                                                            • Sleep.KERNEL32(0000000A), ref: 00EAE6E1
                                                                                                                                                                                                                                            • EnumThreadWindows.USER32(?,Function_0006E665,00000000), ref: 00EAE705
                                                                                                                                                                                                                                            • FindWindowExW.USER32(00000000,00000000,BUTTON,00000000), ref: 00EAE727
                                                                                                                                                                                                                                            • SetActiveWindow.USER32 ref: 00EAE746
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,000000F5,00000000,00000000), ref: 00EAE754
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000010,00000000,00000000), ref: 00EAE773
                                                                                                                                                                                                                                            • Sleep.KERNEL32(000000FA), ref: 00EAE77E
                                                                                                                                                                                                                                            • IsWindow.USER32 ref: 00EAE78A
                                                                                                                                                                                                                                            • EndDialog.USER32(00000000), ref: 00EAE79B
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$MessageSendSleepTimetime$ActiveDialogEnumFindThreadWindows
                                                                                                                                                                                                                                            • String ID: BUTTON
                                                                                                                                                                                                                                            • API String ID: 1194449130-3405671355
                                                                                                                                                                                                                                            • Opcode ID: d86733227b8e44673365a9e160c79fa6a5c5e50dbd384d7f03bb3930bcffefa0
                                                                                                                                                                                                                                            • Instruction ID: 24c0668b0b7fa3e24d34d3aed7421e884e76efb6cabdda9182de1c5ac10258fa
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: d86733227b8e44673365a9e160c79fa6a5c5e50dbd384d7f03bb3930bcffefa0
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9B21C670301209AFEB005F71FC89B653BA9F79A788F216426F511B62E1DB71BC14EA25
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                            • mciSendStringW.WINMM(status PlayMe mode,?,00000100,00000000), ref: 00EAEA5D
                                                                                                                                                                                                                                            • mciSendStringW.WINMM(close PlayMe,00000000,00000000,00000000), ref: 00EAEA73
                                                                                                                                                                                                                                            • mciSendStringW.WINMM(?,00000000,00000000,00000000), ref: 00EAEA84
                                                                                                                                                                                                                                            • mciSendStringW.WINMM(play PlayMe wait,00000000,00000000,00000000), ref: 00EAEA96
                                                                                                                                                                                                                                            • mciSendStringW.WINMM(play PlayMe,00000000,00000000,00000000), ref: 00EAEAA7
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: SendString$_wcslen
                                                                                                                                                                                                                                            • String ID: alias PlayMe$close PlayMe$open $play PlayMe$play PlayMe wait$status PlayMe mode
                                                                                                                                                                                                                                            • API String ID: 2420728520-1007645807
                                                                                                                                                                                                                                            • Opcode ID: aa097e1a97246b1e42a448f98b2e373570a60edde66379bb9de129c40cc77e9e
                                                                                                                                                                                                                                            • Instruction ID: 25010fb5920d0fcaa49ee53d916b4caf623c0e37ea5100faf51f384cdc67a17e
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: aa097e1a97246b1e42a448f98b2e373570a60edde66379bb9de129c40cc77e9e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: BC11A331A902597DE720A7A1EC4AEFF6BBCEBD6B04F001429B411F60D1EE705914D5B1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetKeyboardState.USER32(?), ref: 00EAA012
                                                                                                                                                                                                                                            • SetKeyboardState.USER32(?), ref: 00EAA07D
                                                                                                                                                                                                                                            • GetAsyncKeyState.USER32(000000A0), ref: 00EAA09D
                                                                                                                                                                                                                                            • GetKeyState.USER32(000000A0), ref: 00EAA0B4
                                                                                                                                                                                                                                            • GetAsyncKeyState.USER32(000000A1), ref: 00EAA0E3
                                                                                                                                                                                                                                            • GetKeyState.USER32(000000A1), ref: 00EAA0F4
                                                                                                                                                                                                                                            • GetAsyncKeyState.USER32(00000011), ref: 00EAA120
                                                                                                                                                                                                                                            • GetKeyState.USER32(00000011), ref: 00EAA12E
                                                                                                                                                                                                                                            • GetAsyncKeyState.USER32(00000012), ref: 00EAA157
                                                                                                                                                                                                                                            • GetKeyState.USER32(00000012), ref: 00EAA165
                                                                                                                                                                                                                                            • GetAsyncKeyState.USER32(0000005B), ref: 00EAA18E
                                                                                                                                                                                                                                            • GetKeyState.USER32(0000005B), ref: 00EAA19C
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 541375521-0
                                                                                                                                                                                                                                            • Opcode ID: 74d6fc864c5ba2fa2cf1480bb6cf0ad5402b0fbe0dcd929425f04fd77ff2acd7
                                                                                                                                                                                                                                            • Instruction ID: 841397d0d22a852c5c5aa83102355c6484ade5ff6de317c623d5e018ddea58b1
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 74d6fc864c5ba2fa2cf1480bb6cf0ad5402b0fbe0dcd929425f04fd77ff2acd7
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 0951C76460578429FB35DB6084107AABFF49F1B384F0C55AAD5C26F1C3DB54BA4CC762
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetDlgItem.USER32(?,00000001), ref: 00EA5CE2
                                                                                                                                                                                                                                            • GetWindowRect.USER32(00000000,?), ref: 00EA5CFB
                                                                                                                                                                                                                                            • MoveWindow.USER32(?,0000000A,00000004,?,?,00000004,00000000), ref: 00EA5D59
                                                                                                                                                                                                                                            • GetDlgItem.USER32(?,00000002), ref: 00EA5D69
                                                                                                                                                                                                                                            • GetWindowRect.USER32(00000000,?), ref: 00EA5D7B
                                                                                                                                                                                                                                            • MoveWindow.USER32(?,?,00000004,00000000,?,00000004,00000000), ref: 00EA5DCF
                                                                                                                                                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00EA5DDD
                                                                                                                                                                                                                                            • GetWindowRect.USER32(00000000,?), ref: 00EA5DEF
                                                                                                                                                                                                                                            • MoveWindow.USER32(?,0000000A,00000000,?,00000004,00000000), ref: 00EA5E31
                                                                                                                                                                                                                                            • GetDlgItem.USER32(?,000003EA), ref: 00EA5E44
                                                                                                                                                                                                                                            • MoveWindow.USER32(00000000,0000000A,0000000A,?,-00000005,00000000), ref: 00EA5E5A
                                                                                                                                                                                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00EA5E67
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$ItemMoveRect$Invalidate
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3096461208-0
                                                                                                                                                                                                                                            • Opcode ID: 62cbb7ad48e20fd52f67604d292e2b6f200e2c2d047a11ffb05f27c2169bb0ff
                                                                                                                                                                                                                                            • Instruction ID: 9aa5039e65a423d05c80dd12941d5ceaaa360197c51be19ff4eae2833b1a6380
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 62cbb7ad48e20fd52f67604d292e2b6f200e2c2d047a11ffb05f27c2169bb0ff
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 6D512DB1A00606AFDF18CF69DD89AAEBBB5FB49740F209129F515F6290D770AE04CB50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E58F62: InvalidateRect.USER32(?,00000000,00000001,?,?,?,00E58BE8,?,00000000,?,?,?,?,00E58BBA,00000000,?), ref: 00E58FC5
                                                                                                                                                                                                                                            • DestroyWindow.USER32(?), ref: 00E58C81
                                                                                                                                                                                                                                            • KillTimer.USER32(00000000,?,?,?,?,00E58BBA,00000000,?), ref: 00E58D1B
                                                                                                                                                                                                                                            • DestroyAcceleratorTable.USER32(00000000), ref: 00E96973
                                                                                                                                                                                                                                            • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,00000000,?,?,?,?,00E58BBA,00000000,?), ref: 00E969A1
                                                                                                                                                                                                                                            • ImageList_Destroy.COMCTL32(?,?,?,?,?,?,?,00000000,?,?,?,?,00E58BBA,00000000,?), ref: 00E969B8
                                                                                                                                                                                                                                            • ImageList_Destroy.COMCTL32(00000000,?,?,?,?,?,?,?,?,00000000,?,?,?,?,00E58BBA,00000000), ref: 00E969D4
                                                                                                                                                                                                                                            • DeleteObject.GDI32(00000000), ref: 00E969E6
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Destroy$ImageList_$AcceleratorDeleteInvalidateKillObjectRectTableTimerWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 641708696-0
                                                                                                                                                                                                                                            • Opcode ID: 2ef4d4add92141dbb38d121a37643de85c4b709a1760aea4edbcea70831fff30
                                                                                                                                                                                                                                            • Instruction ID: bcb999d4409d5c7823d8e7242d8a5f359d4f96cbb37867e3edd021f8c2a65c13
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 2ef4d4add92141dbb38d121a37643de85c4b709a1760aea4edbcea70831fff30
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B661BD30102605DFDF219F25DA48BA9B7F1FB4036AF11A91EE542BA560CB71AC88DF91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E59944: GetWindowLongW.USER32(?,000000EB), ref: 00E59952
                                                                                                                                                                                                                                            • GetSysColor.USER32(0000000F), ref: 00E59862
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ColorLongWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 259745315-0
                                                                                                                                                                                                                                            • Opcode ID: 20dd3a74a76edf4e24e551a7a2285e988b729d5ee1c6cffbe60c678edabb414b
                                                                                                                                                                                                                                            • Instruction ID: 95a5e341e01231a7c0c0d44c2401a66ab57d146b92bc0b00bbafa5b56988d5d6
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 20dd3a74a76edf4e24e551a7a2285e988b729d5ee1c6cffbe60c678edabb414b
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 1B41B131105610DFDF245F39AC84BF93BA5EB06376F245A06FAA2AB1E2C7309C49DB10
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID: .
                                                                                                                                                                                                                                            • API String ID: 0-3963672497
                                                                                                                                                                                                                                            • Opcode ID: 1addaeb056a19e08121e9d66ce074e917d78f1148585f28ca469f42fb299d883
                                                                                                                                                                                                                                            • Instruction ID: 01b15b178c08e32abd94f0ceea9bf65856c3ced2908146a2ba4fb7a69d4c1d28
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 1addaeb056a19e08121e9d66ce074e917d78f1148585f28ca469f42fb299d883
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2FC10274A44249AFCB11DFA8E845BEDBBF0AF5A314F189199F518B7392CB308941CB61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetModuleHandleW.KERNEL32(00000000,?,00000FFF,00000001,00000000,?,?,00E8F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?), ref: 00EA9717
                                                                                                                                                                                                                                            • LoadStringW.USER32(00000000,?,00E8F7F8,00000001), ref: 00EA9720
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                            • GetModuleHandleW.KERNEL32(00000000,00000001,?,00000FFF,?,?,00E8F7F8,00000001,0000138C,00000001,?,00000001,00000000,?,?,00000000), ref: 00EA9742
                                                                                                                                                                                                                                            • LoadStringW.USER32(00000000,?,00E8F7F8,00000001), ref: 00EA9745
                                                                                                                                                                                                                                            • MessageBoxW.USER32(00000000,00000000,?,00011010), ref: 00EA9866
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: HandleLoadModuleString$Message_wcslen
                                                                                                                                                                                                                                            • String ID: Error: $%s (%d) : ==> %s: %s %s$Line %d (File "%s"):$Line %d:$^ ERROR
                                                                                                                                                                                                                                            • API String ID: 747408836-2268648507
                                                                                                                                                                                                                                            • Opcode ID: 17db5233b94d35bf7f801d70fae7e851b2159bdddc8632d7e5605ef02f497b40
                                                                                                                                                                                                                                            • Instruction ID: 9d7710d0b9c4e36a0b0cdfe798123ed66401c4f342068e0054a7cc9f7d834afb
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 17db5233b94d35bf7f801d70fae7e851b2159bdddc8632d7e5605ef02f497b40
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 98413E72900219AADF04EFE0ED86DEEB7B8AF59340F601065F60576092EB356F48DB61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E46B57: _wcslen.LIBCMT ref: 00E46B6A
                                                                                                                                                                                                                                            • WNetAddConnection2W.MPR(?,?,?,00000000), ref: 00EA07A2
                                                                                                                                                                                                                                            • RegConnectRegistryW.ADVAPI32(?,80000002,?), ref: 00EA07BE
                                                                                                                                                                                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,00020019,?,?,SOFTWARE\Classes\), ref: 00EA07DA
                                                                                                                                                                                                                                            • RegQueryValueExW.ADVAPI32(?,00000000,00000000,00000000,?,?,?,SOFTWARE\Classes\), ref: 00EA0804
                                                                                                                                                                                                                                            • CLSIDFromString.OLE32(?,000001FE,?,SOFTWARE\Classes\), ref: 00EA082C
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00EA0837
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(?,?,SOFTWARE\Classes\), ref: 00EA083C
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Close$ConnectConnection2FromOpenQueryRegistryStringValue_wcslen
                                                                                                                                                                                                                                            • String ID: SOFTWARE\Classes\$\CLSID$\IPC$
                                                                                                                                                                                                                                            • API String ID: 323675364-22481851
                                                                                                                                                                                                                                            • Opcode ID: 1fbdc5a30241af7cdc291507b4a278bedba895f3ec3e06162eab853bb19ad72f
                                                                                                                                                                                                                                            • Instruction ID: 756f7f10579faed60af4d3b4397abe69d804afd61b8f6567174477b81f365f65
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 1fbdc5a30241af7cdc291507b4a278bedba895f3ec3e06162eab853bb19ad72f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C2411A72C00129AFDF15EBA4EC858EEB7B8FF48754B145125E901B71A1DB30AD04CB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • MoveWindow.USER32(?,?,?,000000FF,000000FF,00000000,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?), ref: 00ED403B
                                                                                                                                                                                                                                            • CreateCompatibleDC.GDI32(00000000), ref: 00ED4042
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000173,00000000,00000000), ref: 00ED4055
                                                                                                                                                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00ED405D
                                                                                                                                                                                                                                            • GetPixel.GDI32(00000000,00000000,00000000), ref: 00ED4068
                                                                                                                                                                                                                                            • DeleteDC.GDI32(00000000), ref: 00ED4072
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(?,000000EC), ref: 00ED407C
                                                                                                                                                                                                                                            • SetLayeredWindowAttributes.USER32(?,?,00000000,00000001,?,00000000,?), ref: 00ED4092
                                                                                                                                                                                                                                            • DestroyWindow.USER32(?,?,?,000000FF,000000FF,?,?,static,00000000,00000000,?,?,00000000,00000000,?), ref: 00ED409E
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$AttributesCompatibleCreateDeleteDestroyLayeredLongMessageMoveObjectPixelSelectSend
                                                                                                                                                                                                                                            • String ID: static
                                                                                                                                                                                                                                            • API String ID: 2559357485-2160076837
                                                                                                                                                                                                                                            • Opcode ID: a25bea5ef0a56dc5d7dc397d8664d1f0cc676d07b0255fb51fd5ba5055a9974c
                                                                                                                                                                                                                                            • Instruction ID: 02b0707a46d7ebf0a5e741fb9564ef6bec18daa7b91685b1d3492c82b25dbf94
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a25bea5ef0a56dc5d7dc397d8664d1f0cc676d07b0255fb51fd5ba5055a9974c
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 3E317C7210221AAFDF219FA5EC09FDA3BA9EF0D764F111212FA14B61E0C735D815DB51
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • VariantInit.OLEAUT32(?), ref: 00EC3C5C
                                                                                                                                                                                                                                            • CoInitialize.OLE32(00000000), ref: 00EC3C8A
                                                                                                                                                                                                                                            • CoUninitialize.OLE32 ref: 00EC3C94
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EC3D2D
                                                                                                                                                                                                                                            • GetRunningObjectTable.OLE32(00000000,?), ref: 00EC3DB1
                                                                                                                                                                                                                                            • SetErrorMode.KERNEL32(00000001,00000029), ref: 00EC3ED5
                                                                                                                                                                                                                                            • CoGetInstanceFromFile.OLE32(00000000,?,00000000,00000015,00000002,?,00000001,?), ref: 00EC3F0E
                                                                                                                                                                                                                                            • CoGetObject.OLE32(?,00000000,00EDFB98,?), ref: 00EC3F2D
                                                                                                                                                                                                                                            • SetErrorMode.KERNEL32(00000000), ref: 00EC3F40
                                                                                                                                                                                                                                            • SetErrorMode.KERNEL32(00000000,00000000,00000000,00000000,00000000), ref: 00EC3FC4
                                                                                                                                                                                                                                            • VariantClear.OLEAUT32(?), ref: 00EC3FD8
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorMode$ObjectVariant$ClearFileFromInitInitializeInstanceRunningTableUninitialize_wcslen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 429561992-0
                                                                                                                                                                                                                                            • Opcode ID: ab525d899641167c4a004335f1f49e8d3f7888f7d1d6acba1369d3072b0a5dcf
                                                                                                                                                                                                                                            • Instruction ID: 4d04f891bb24805ac19e079fcdb2a08524992640cee4515d3d5d9aa935b6f4b9
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ab525d899641167c4a004335f1f49e8d3f7888f7d1d6acba1369d3072b0a5dcf
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 3AC113716083019F9700DF68C984E6BBBE9FF89748F10991DF98AAB251D731ED06CB52
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CoInitialize.OLE32(00000000), ref: 00EB7AF3
                                                                                                                                                                                                                                            • SHGetSpecialFolderLocation.SHELL32(00000000,00000000,?), ref: 00EB7B8F
                                                                                                                                                                                                                                            • SHGetDesktopFolder.SHELL32(?), ref: 00EB7BA3
                                                                                                                                                                                                                                            • CoCreateInstance.OLE32(00EDFD08,00000000,00000001,00F06E6C,?), ref: 00EB7BEF
                                                                                                                                                                                                                                            • SHCreateShellItem.SHELL32(00000000,00000000,?,00000003), ref: 00EB7C74
                                                                                                                                                                                                                                            • CoTaskMemFree.OLE32(?,?), ref: 00EB7CCC
                                                                                                                                                                                                                                            • SHBrowseForFolderW.SHELL32(?), ref: 00EB7D57
                                                                                                                                                                                                                                            • SHGetPathFromIDListW.SHELL32(00000000,?), ref: 00EB7D7A
                                                                                                                                                                                                                                            • CoTaskMemFree.OLE32(00000000), ref: 00EB7D81
                                                                                                                                                                                                                                            • CoTaskMemFree.OLE32(00000000), ref: 00EB7DD6
                                                                                                                                                                                                                                            • CoUninitialize.OLE32 ref: 00EB7DDC
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: FolderFreeTask$Create$BrowseDesktopFromInitializeInstanceItemListLocationPathShellSpecialUninitialize
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2762341140-0
                                                                                                                                                                                                                                            • Opcode ID: 2b60e3dcd6f08529f576f3cd94e786e843e1ef55b87adb2acb97046fdcf487e9
                                                                                                                                                                                                                                            • Instruction ID: 482aebb42f00eca01547aaf749eaf7affefd315bc0630d05aff1776204a3cfd0
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 2b60e3dcd6f08529f576f3cd94e786e843e1ef55b87adb2acb97046fdcf487e9
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: E5C15A74A04109AFCB04DFA4D884DAEBBF9FF88344B149499E859EB761C730ED45CB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000158,000000FF,00000158), ref: 00ED5504
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00ED5515
                                                                                                                                                                                                                                            • CharNextW.USER32(00000158), ref: 00ED5544
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000014B,00000000,00000000), ref: 00ED5585
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000158,000000FF,0000014E), ref: 00ED559B
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00ED55AC
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$CharNext
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1350042424-0
                                                                                                                                                                                                                                            • Opcode ID: 928830bf6e96702ab88693edbb37c7fe01a9bfa06dff8f4634e7d946613f39a6
                                                                                                                                                                                                                                            • Instruction ID: b36c146dc1d689201712b305ea480b974bdf0ce6650046c1cc994af990970506
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 928830bf6e96702ab88693edbb37c7fe01a9bfa06dff8f4634e7d946613f39a6
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 39618D32901609EFDB108F55DC849FE7BB9EB05764F10514BF935BA390D7708A82DB62
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SafeArrayAllocDescriptorEx.OLEAUT32(0000000C,?,?), ref: 00E9FAAF
                                                                                                                                                                                                                                            • SafeArrayAllocData.OLEAUT32(?), ref: 00E9FB08
                                                                                                                                                                                                                                            • VariantInit.OLEAUT32(?), ref: 00E9FB1A
                                                                                                                                                                                                                                            • SafeArrayAccessData.OLEAUT32(?,?), ref: 00E9FB3A
                                                                                                                                                                                                                                            • VariantCopy.OLEAUT32(?,?), ref: 00E9FB8D
                                                                                                                                                                                                                                            • SafeArrayUnaccessData.OLEAUT32(?), ref: 00E9FBA1
                                                                                                                                                                                                                                            • VariantClear.OLEAUT32(?), ref: 00E9FBB6
                                                                                                                                                                                                                                            • SafeArrayDestroyData.OLEAUT32(?), ref: 00E9FBC3
                                                                                                                                                                                                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00E9FBCC
                                                                                                                                                                                                                                            • VariantClear.OLEAUT32(?), ref: 00E9FBDE
                                                                                                                                                                                                                                            • SafeArrayDestroyDescriptor.OLEAUT32(?), ref: 00E9FBE9
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ArraySafe$DataVariant$DescriptorDestroy$AllocClear$AccessCopyInitUnaccess
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2706829360-0
                                                                                                                                                                                                                                            • Opcode ID: b543d504fb3ee7c52ae182ce244d8a6a6701e98c0f48f7accbb5a2bbb7330d96
                                                                                                                                                                                                                                            • Instruction ID: 2c6c6a232b428d372e0ad810e7015b19fdb2c38a9cff2e277acd7261e7dc7088
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b543d504fb3ee7c52ae182ce244d8a6a6701e98c0f48f7accbb5a2bbb7330d96
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9D417035A0021A9FCF04DF64D8649EEBBB9FF08344F109069E955F7261DB70A945CF90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetKeyboardState.USER32(?), ref: 00EA9CA1
                                                                                                                                                                                                                                            • GetAsyncKeyState.USER32(000000A0), ref: 00EA9D22
                                                                                                                                                                                                                                            • GetKeyState.USER32(000000A0), ref: 00EA9D3D
                                                                                                                                                                                                                                            • GetAsyncKeyState.USER32(000000A1), ref: 00EA9D57
                                                                                                                                                                                                                                            • GetKeyState.USER32(000000A1), ref: 00EA9D6C
                                                                                                                                                                                                                                            • GetAsyncKeyState.USER32(00000011), ref: 00EA9D84
                                                                                                                                                                                                                                            • GetKeyState.USER32(00000011), ref: 00EA9D96
                                                                                                                                                                                                                                            • GetAsyncKeyState.USER32(00000012), ref: 00EA9DAE
                                                                                                                                                                                                                                            • GetKeyState.USER32(00000012), ref: 00EA9DC0
                                                                                                                                                                                                                                            • GetAsyncKeyState.USER32(0000005B), ref: 00EA9DD8
                                                                                                                                                                                                                                            • GetKeyState.USER32(0000005B), ref: 00EA9DEA
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: State$Async$Keyboard
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 541375521-0
                                                                                                                                                                                                                                            • Opcode ID: ae1b53eb5400c017343da7ccf4f5c250e7fcbfe0a838fe4cca55ed9adc397490
                                                                                                                                                                                                                                            • Instruction ID: 506d288515bfa5406750d3e90786c7ceadfddb10f8ff159e2c522af694095074
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ae1b53eb5400c017343da7ccf4f5c250e7fcbfe0a838fe4cca55ed9adc397490
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9A41C734504BCA6DFF30866094443A5FEE0AF1B358F08905AD6C67E5C3D7A4B9C8C792
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • WSAStartup.WSOCK32(00000101,?), ref: 00EC05BC
                                                                                                                                                                                                                                            • inet_addr.WSOCK32(?), ref: 00EC061C
                                                                                                                                                                                                                                            • gethostbyname.WSOCK32(?), ref: 00EC0628
                                                                                                                                                                                                                                            • IcmpCreateFile.IPHLPAPI ref: 00EC0636
                                                                                                                                                                                                                                            • IcmpSendEcho.IPHLPAPI(?,?,?,00000005,00000000,?,00000029,00000FA0), ref: 00EC06C6
                                                                                                                                                                                                                                            • IcmpSendEcho.IPHLPAPI(00000000,00000000,?,00000005,00000000,?,00000029,00000FA0), ref: 00EC06E5
                                                                                                                                                                                                                                            • IcmpCloseHandle.IPHLPAPI(?), ref: 00EC07B9
                                                                                                                                                                                                                                            • WSACleanup.WSOCK32 ref: 00EC07BF
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Icmp$EchoSend$CleanupCloseCreateFileHandleStartupgethostbynameinet_addr
                                                                                                                                                                                                                                            • String ID: Ping
                                                                                                                                                                                                                                            • API String ID: 1028309954-2246546115
                                                                                                                                                                                                                                            • Opcode ID: 24e3b950196ec37de496c770a6173e5f8e653d1f62f27d1be70d6f30f6b4a06c
                                                                                                                                                                                                                                            • Instruction ID: a934fd4e5c16a680a1b7de5626ec4c7349ba41d9153cb0317ba1b4f5e9cdfe7b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 24e3b950196ec37de496c770a6173e5f8e653d1f62f27d1be70d6f30f6b4a06c
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 5591AC34608201DFD724DF15D689F1ABBE0EF48318F1495AEE469AB6A2C731ED46CF81
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen$BuffCharLower
                                                                                                                                                                                                                                            • String ID: cdecl$none$stdcall$winapi
                                                                                                                                                                                                                                            • API String ID: 707087890-567219261
                                                                                                                                                                                                                                            • Opcode ID: 6e74fbf46b8306b90543d4e65272cda32b53a6383d5edb8cc7404a0c7a1fa702
                                                                                                                                                                                                                                            • Instruction ID: 3339b709c0a213b7b03b38cf2a9e9dc7cb5fb9e6c833d71dea169b2d9cb2cc65
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 6e74fbf46b8306b90543d4e65272cda32b53a6383d5edb8cc7404a0c7a1fa702
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: FC518D31A001169ACB14DF68CB50ABEB7E5AF64328B20522DE426F72C5DB32ED42C790
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CoInitialize.OLE32 ref: 00EC3774
                                                                                                                                                                                                                                            • CoUninitialize.OLE32 ref: 00EC377F
                                                                                                                                                                                                                                            • CoCreateInstance.OLE32(?,00000000,00000017,00EDFB78,?), ref: 00EC37D9
                                                                                                                                                                                                                                            • IIDFromString.OLE32(?,?), ref: 00EC384C
                                                                                                                                                                                                                                            • VariantInit.OLEAUT32(?), ref: 00EC38E4
                                                                                                                                                                                                                                            • VariantClear.OLEAUT32(?), ref: 00EC3936
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Variant$ClearCreateFromInitInitializeInstanceStringUninitialize
                                                                                                                                                                                                                                            • String ID: Failed to create object$Invalid parameter$NULL Pointer assignment
                                                                                                                                                                                                                                            • API String ID: 636576611-1287834457
                                                                                                                                                                                                                                            • Opcode ID: bdb725454fe020780ea25b7111cae830fc245dc0250e74ec6e96070d4f60c429
                                                                                                                                                                                                                                            • Instruction ID: e9d7b0446c6a16912fa1cb3767fc1d4af5852fa2e44968ab67c3ff090f670d5d
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: bdb725454fe020780ea25b7111cae830fc245dc0250e74ec6e96070d4f60c429
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7261BD71608301AFD314DF64D988F9ABBE4EF49714F10980EF985AB291C771EE49CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • LoadStringW.USER32(00000066,?,00000FFF,?), ref: 00EB33CF
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                            • LoadStringW.USER32(00000072,?,00000FFF,?), ref: 00EB33F0
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Incorrect parameters to object property !$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                            • API String ID: 4099089115-3080491070
                                                                                                                                                                                                                                            • Opcode ID: 3c08b6af42e307bab3e9dbb9d0e5cc08b6d7bd5a9952ba0d063397227a261e9f
                                                                                                                                                                                                                                            • Instruction ID: d7190169f1d8b9aa70a09650f4b59cfb2f1075d947c484973b5de2579d271f8a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 3c08b6af42e307bab3e9dbb9d0e5cc08b6d7bd5a9952ba0d063397227a261e9f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B151A272D00209AADF15EBE0ED46EEEB3B9EF08340F205165F51572092EB356F58EB61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                            • String ID: APPEND$EXISTS$KEYS$REMOVE
                                                                                                                                                                                                                                            • API String ID: 1256254125-769500911
                                                                                                                                                                                                                                            • Opcode ID: e1782025a3b2838c75b98c32b0351370c4c6278639a2e965d73207f51e8916f8
                                                                                                                                                                                                                                            • Instruction ID: 97223d1f27c8c40dfa3129a70fad2361a066279bc4cbae0465fd4efbd5ae2c10
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: e1782025a3b2838c75b98c32b0351370c4c6278639a2e965d73207f51e8916f8
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B241EC32A000279BCB105F7DC8905BE77E5AFEA758B245229E421FF286E731DD81D790
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SetErrorMode.KERNEL32(00000001), ref: 00EB53A0
                                                                                                                                                                                                                                            • GetDiskFreeSpaceW.KERNEL32(?,?,?,?,?,00000002,00000001), ref: 00EB5416
                                                                                                                                                                                                                                            • GetLastError.KERNEL32 ref: 00EB5420
                                                                                                                                                                                                                                            • SetErrorMode.KERNEL32(00000000,READY), ref: 00EB54A7
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Error$Mode$DiskFreeLastSpace
                                                                                                                                                                                                                                            • String ID: INVALID$NOTREADY$READONLY$READY$UNKNOWN
                                                                                                                                                                                                                                            • API String ID: 4194297153-14809454
                                                                                                                                                                                                                                            • Opcode ID: 66080c257d91e04a68380c5e0f189d1bf3b751b5830d9ac7343956cdc4b26ece
                                                                                                                                                                                                                                            • Instruction ID: 0bbb4fc5ee9c83fd06890bc0d1ba6193be72887f5061cb1e4f5a4afd4c2a329d
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 66080c257d91e04a68380c5e0f189d1bf3b751b5830d9ac7343956cdc4b26ece
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2A31B036A006059FD710DF68D884BEBBBF4EF45309F149066E416EB292DB71DD86CB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CreateMenu.USER32 ref: 00ED3C79
                                                                                                                                                                                                                                            • SetMenu.USER32(?,00000000), ref: 00ED3C88
                                                                                                                                                                                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00ED3D10
                                                                                                                                                                                                                                            • IsMenu.USER32(?), ref: 00ED3D24
                                                                                                                                                                                                                                            • CreatePopupMenu.USER32 ref: 00ED3D2E
                                                                                                                                                                                                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00ED3D5B
                                                                                                                                                                                                                                            • DrawMenuBar.USER32 ref: 00ED3D63
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Menu$CreateItem$DrawInfoInsertPopup
                                                                                                                                                                                                                                            • String ID: 0$F
                                                                                                                                                                                                                                            • API String ID: 161812096-3044882817
                                                                                                                                                                                                                                            • Opcode ID: 33e65c90e69cbc94b2e18e932df941d9b6fa2b55c1cfce9b20a33b2d6c35626b
                                                                                                                                                                                                                                            • Instruction ID: b0f0d3346c1054d9dec3ff9c146eb38ca015f22bfbd7fa22c80814dc6b83bfe3
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 33e65c90e69cbc94b2e18e932df941d9b6fa2b55c1cfce9b20a33b2d6c35626b
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: AF417E75A0120AEFDF14CF65E844ADA77B6FF49354F24002AF946A7360D730AA15CF51
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                              • Part of subcall function 00EA3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00EA3CCA
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000018C,000000FF,00020000), ref: 00EA1F64
                                                                                                                                                                                                                                            • GetDlgCtrlID.USER32 ref: 00EA1F6F
                                                                                                                                                                                                                                            • GetParent.USER32 ref: 00EA1F8B
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00EA1F8E
                                                                                                                                                                                                                                            • GetDlgCtrlID.USER32(?), ref: 00EA1F97
                                                                                                                                                                                                                                            • GetParent.USER32(?), ref: 00EA1FAB
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00EA1FAE
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                            • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                            • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                            • Opcode ID: 7bc752ed4032718e28d8c6859ede319dfe6dc4bc86c30083e0c289e9bee3ab73
                                                                                                                                                                                                                                            • Instruction ID: 137fd97e28f3185bcab59ddd27516a544e738022563c734532849cdffc5e4a83
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 7bc752ed4032718e28d8c6859ede319dfe6dc4bc86c30083e0c289e9bee3ab73
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: EC21B374E00114BFCF04AFA0EC859EEBBB4EF0A350F101156B961772D1CB74A908DB61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                              • Part of subcall function 00EA3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00EA3CCA
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000186,00020000,00000000), ref: 00EA2043
                                                                                                                                                                                                                                            • GetDlgCtrlID.USER32 ref: 00EA204E
                                                                                                                                                                                                                                            • GetParent.USER32 ref: 00EA206A
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00EA206D
                                                                                                                                                                                                                                            • GetDlgCtrlID.USER32(?), ref: 00EA2076
                                                                                                                                                                                                                                            • GetParent.USER32(?), ref: 00EA208A
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,?,00000111,?), ref: 00EA208D
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$CtrlParent$ClassName_wcslen
                                                                                                                                                                                                                                            • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                            • API String ID: 711023334-1403004172
                                                                                                                                                                                                                                            • Opcode ID: 9d176de7fd9dc129f9bd4c3873a92b61ca876513223598fc6702c164a9b17570
                                                                                                                                                                                                                                            • Instruction ID: 2a842223ff2ec316dd34a29f80e3859cee459068d134f5c1ec4e867f6b9c6ff8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9d176de7fd9dc129f9bd4c3873a92b61ca876513223598fc6702c164a9b17570
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: FF21D775D00214BFCF14AFA4DC85EEEBFB8EF09340F105006B951BB191CA759918DB61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000101F,00000000,00000000), ref: 00ED3A9D
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,?,0000101F,00000000), ref: 00ED3AA0
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00ED3AC7
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001004,00000000,00000000), ref: 00ED3AEA
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000104D,00000000,00000007), ref: 00ED3B62
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001074,00000000,00000007), ref: 00ED3BAC
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001057,00000000,00000000), ref: 00ED3BC7
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000101D,00001004,00000000), ref: 00ED3BE2
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000101E,00001004,00000000), ref: 00ED3BF6
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001008,00000000,00000007), ref: 00ED3C13
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$LongWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 312131281-0
                                                                                                                                                                                                                                            • Opcode ID: f10e226a1cd8e3d05961841f2bc4f072351faf821fbb23e4409249597fc38637
                                                                                                                                                                                                                                            • Instruction ID: 9ba20eb11699899047fb5f43ef814fff2d704ede4fe1c31fb97acd1694ad3692
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f10e226a1cd8e3d05961841f2bc4f072351faf821fbb23e4409249597fc38637
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9E615B75A00248AFDB10DFA8CC81EEE77F8EB09714F10419AFA15A7391D770AE46DB61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00EAB151
                                                                                                                                                                                                                                            • GetForegroundWindow.USER32(00000000,?,?,?,?,?,00EAA1E1,?,00000001), ref: 00EAB165
                                                                                                                                                                                                                                            • GetWindowThreadProcessId.USER32(00000000), ref: 00EAB16C
                                                                                                                                                                                                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00EAA1E1,?,00000001), ref: 00EAB17B
                                                                                                                                                                                                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00EAB18D
                                                                                                                                                                                                                                            • AttachThreadInput.USER32(?,00000000,00000001,?,?,?,?,?,00EAA1E1,?,00000001), ref: 00EAB1A6
                                                                                                                                                                                                                                            • AttachThreadInput.USER32(00000000,00000000,00000001,?,?,?,?,?,00EAA1E1,?,00000001), ref: 00EAB1B8
                                                                                                                                                                                                                                            • AttachThreadInput.USER32(00000000,00000000,?,?,?,?,?,00EAA1E1,?,00000001), ref: 00EAB1FD
                                                                                                                                                                                                                                            • AttachThreadInput.USER32(?,?,00000000,?,?,?,?,?,00EAA1E1,?,00000001), ref: 00EAB212
                                                                                                                                                                                                                                            • AttachThreadInput.USER32(00000000,?,00000000,?,?,?,?,?,00EAA1E1,?,00000001), ref: 00EAB21D
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Thread$AttachInput$Window$Process$CurrentForeground
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2156557900-0
                                                                                                                                                                                                                                            • Opcode ID: 04ad2d3224992846975bc28a5c81e2d6e5859f776144f2f1f35fd4fbd7369c98
                                                                                                                                                                                                                                            • Instruction ID: f0822bf3b4f0d7e82295bd6f07cec7db2943c219d6b01ddf250a87c85db891df
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 04ad2d3224992846975bc28a5c81e2d6e5859f776144f2f1f35fd4fbd7369c98
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: E431C371501208BFDB109F25EC44BAD7BA9FB5A399F219006F911FA1A1D7B4AD40CF70
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72C94
                                                                                                                                                                                                                                              • Part of subcall function 00E729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00E7D7D1,00000000,00000000,00000000,00000000,?,00E7D7F8,00000000,00000007,00000000,?,00E7DBF5,00000000), ref: 00E729DE
                                                                                                                                                                                                                                              • Part of subcall function 00E729C8: GetLastError.KERNEL32(00000000,?,00E7D7D1,00000000,00000000,00000000,00000000,?,00E7D7F8,00000000,00000007,00000000,?,00E7DBF5,00000000,00000000), ref: 00E729F0
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72CA0
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72CAB
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72CB6
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72CC1
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72CCC
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72CD7
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72CE2
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72CED
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72CFB
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 776569668-0
                                                                                                                                                                                                                                            • Opcode ID: 9f19e327e29317bc26eaae652a9fdabb019bb6843338b74cd61ef6d379592a61
                                                                                                                                                                                                                                            • Instruction ID: 3a2aae6ce47a1cb69755843b8c97b571b5a9609d963a5aa2637e0a22983ddb2f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9f19e327e29317bc26eaae652a9fdabb019bb6843338b74cd61ef6d379592a61
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B511A776500108AFCB02EF64D842CDD7BA5FF45350F4594A9FB4C6F222D631EE909B90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetCurrentDirectoryW.KERNEL32(00007FFF,?), ref: 00EB7FAD
                                                                                                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00EB7FC1
                                                                                                                                                                                                                                            • GetFileAttributesW.KERNEL32(?), ref: 00EB7FEB
                                                                                                                                                                                                                                            • SetFileAttributesW.KERNEL32(?,00000000), ref: 00EB8005
                                                                                                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00EB8017
                                                                                                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(?), ref: 00EB8060
                                                                                                                                                                                                                                            • SetCurrentDirectoryW.KERNEL32(?,?,?,?,?), ref: 00EB80B0
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CurrentDirectory$AttributesFile
                                                                                                                                                                                                                                            • String ID: *.*
                                                                                                                                                                                                                                            • API String ID: 769691225-438819550
                                                                                                                                                                                                                                            • Opcode ID: 468841fdd3a09dd053eb56bebc77cefc51b1e368cd054a1be410d4b99f350514
                                                                                                                                                                                                                                            • Instruction ID: dcabc4ec09e831817637197586a52e090e32ba34acf1b43be4ecb994f1897ea5
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 468841fdd3a09dd053eb56bebc77cefc51b1e368cd054a1be410d4b99f350514
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 03818F715082019BDB20EF14C844AEBB3E8AFC8354F14685EF8C5E7651EB35ED49CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SetWindowLongW.USER32(?,000000EB), ref: 00E45C7A
                                                                                                                                                                                                                                              • Part of subcall function 00E45D0A: GetClientRect.USER32(?,?), ref: 00E45D30
                                                                                                                                                                                                                                              • Part of subcall function 00E45D0A: GetWindowRect.USER32(?,?), ref: 00E45D71
                                                                                                                                                                                                                                              • Part of subcall function 00E45D0A: ScreenToClient.USER32(?,?), ref: 00E45D99
                                                                                                                                                                                                                                            • GetDC.USER32 ref: 00E846F5
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000031,00000000,00000000), ref: 00E84708
                                                                                                                                                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00E84716
                                                                                                                                                                                                                                            • SelectObject.GDI32(00000000,00000000), ref: 00E8472B
                                                                                                                                                                                                                                            • ReleaseDC.USER32(?,00000000), ref: 00E84733
                                                                                                                                                                                                                                            • MoveWindow.USER32(?,?,?,?,?,?,?,00000031,00000000,00000000), ref: 00E847C4
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$ClientObjectRectSelect$LongMessageMoveReleaseScreenSend
                                                                                                                                                                                                                                            • String ID: U
                                                                                                                                                                                                                                            • API String ID: 4009187628-3372436214
                                                                                                                                                                                                                                            • Opcode ID: ad9eb968f4d2c3e03df7ca4835b04fcabf3d19d78a7f5266714c1c1ebd5094c9
                                                                                                                                                                                                                                            • Instruction ID: 3af10999165d3c4369e10c078ec488f4308bedfb5ad2a99fd9bc548911739a52
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ad9eb968f4d2c3e03df7ca4835b04fcabf3d19d78a7f5266714c1c1ebd5094c9
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: A571F371400206DFCF21AF64D984AFA7BB1FF4A368F14626AED5D7A1A6D3318841DF50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • LoadStringW.USER32(00000066,?,00000FFF,00000000), ref: 00EB35E4
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                            • LoadStringW.USER32(00F12390,?,00000FFF,?), ref: 00EB360A
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: LoadString$_wcslen
                                                                                                                                                                                                                                            • String ID: Error: $"%s" (%d) : ==> %s:$"%s" (%d) : ==> %s:%s%s$Line %d (File "%s"):$^ ERROR
                                                                                                                                                                                                                                            • API String ID: 4099089115-2391861430
                                                                                                                                                                                                                                            • Opcode ID: f94a393468cf298b46d49bdcb374926ecafdedfd1f8a5570ad2780746c09d554
                                                                                                                                                                                                                                            • Instruction ID: 062f3bf06dacd8b8dbb4651591184ac011de47535affbf2acf854f7c22fb30d0
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f94a393468cf298b46d49bdcb374926ecafdedfd1f8a5570ad2780746c09d554
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 5F517171D00219BADF15EBA0EC42EEEBBB4EF04304F146125F51572192DB316B99DFA1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00EBC272
                                                                                                                                                                                                                                            • HttpSendRequestW.WININET(00000000,00000000,00000000,00000000,00000000), ref: 00EBC29A
                                                                                                                                                                                                                                            • HttpQueryInfoW.WININET(00000000,00000005,?,?,?), ref: 00EBC2CA
                                                                                                                                                                                                                                            • GetLastError.KERNEL32 ref: 00EBC322
                                                                                                                                                                                                                                            • SetEvent.KERNEL32(?), ref: 00EBC336
                                                                                                                                                                                                                                            • InternetCloseHandle.WININET(00000000), ref: 00EBC341
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: HttpInternet$CloseErrorEventHandleInfoLastOpenQueryRequestSend
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3113390036-3916222277
                                                                                                                                                                                                                                            • Opcode ID: 9014e2d29b3639eae70fa05e23f8fbe997609ae97b66f551bc5af3af50d66ebe
                                                                                                                                                                                                                                            • Instruction ID: 60db359300a64e65523e288ee972d3946d387bf5b4953c92321809d92e7aae95
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9014e2d29b3639eae70fa05e23f8fbe997609ae97b66f551bc5af3af50d66ebe
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 17319171608608AFD7219F659C84AEB7BFCEB49784B64951EF486F2210DB34DD058B60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000FFF,00000000,?,00E83AAF,?,?,Bad directive syntax error,00EDCC08,00000000,00000010,?,?,>>>AUTOIT SCRIPT<<<), ref: 00EA98BC
                                                                                                                                                                                                                                            • LoadStringW.USER32(00000000,?,00E83AAF,?), ref: 00EA98C3
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                            • MessageBoxW.USER32(00000000,00000001,00000001,00011010), ref: 00EA9987
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: HandleLoadMessageModuleString_wcslen
                                                                                                                                                                                                                                            • String ID: Error: $%s (%d) : ==> %s.: %s %s$.$Line %d (File "%s"):$Line %d:
                                                                                                                                                                                                                                            • API String ID: 858772685-4153970271
                                                                                                                                                                                                                                            • Opcode ID: d3ba866c33aec441cb43705e14ce2e790514772ad6e8c0f1ab1bcb98205c5db6
                                                                                                                                                                                                                                            • Instruction ID: 2576b4bc77724f5333dc225012532664db0eb139bac5c52413cf6227ebac7a06
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: d3ba866c33aec441cb43705e14ce2e790514772ad6e8c0f1ab1bcb98205c5db6
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 90216F3290021AABDF15EF90DC0AEEE77B5FF18300F045466F515760A2DA31A628EB51
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetParent.USER32 ref: 00EA20AB
                                                                                                                                                                                                                                            • GetClassNameW.USER32(00000000,?,00000100), ref: 00EA20C0
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000111,0000702B,00000000), ref: 00EA214D
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ClassMessageNameParentSend
                                                                                                                                                                                                                                            • String ID: SHELLDLL_DefView$details$largeicons$list$smallicons
                                                                                                                                                                                                                                            • API String ID: 1290815626-3381328864
                                                                                                                                                                                                                                            • Opcode ID: 1abe62878f475493a2e02de6b2e0fdfc191c28f6f7b68ae1485886910dec67d7
                                                                                                                                                                                                                                            • Instruction ID: 36a9a6f159d9abd93355379aa3cdaef99d2f7e2064395906c36239dd5401f912
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 1abe62878f475493a2e02de6b2e0fdfc191c28f6f7b68ae1485886910dec67d7
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2C11EBB66C570779FA012224AC06DE737DCCB1A754B20211AF704B90D1FAA1B8416915
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _free$EnvironmentVariable___from_strstr_to_strchr
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1282221369-0
                                                                                                                                                                                                                                            • Opcode ID: 8f1f9d4e445c27512ab5b532dd1f1fef2aa9f909895fcd1803ae530f11c194a2
                                                                                                                                                                                                                                            • Instruction ID: f3aa07bc893811c36776752ab7f8dbffbb93a8711fb6d340c72557a0443d79de
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 8f1f9d4e445c27512ab5b532dd1f1fef2aa9f909895fcd1803ae530f11c194a2
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 36616C71A043046FDB29AFB4AC41AAD7BE9EF05314F24E16EFA4CB7281DB319D418750
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00002001,00000000,00000000), ref: 00ED5186
                                                                                                                                                                                                                                            • ShowWindow.USER32(?,00000000), ref: 00ED51C7
                                                                                                                                                                                                                                            • ShowWindow.USER32(?,00000005,?,00000000), ref: 00ED51CD
                                                                                                                                                                                                                                            • SetFocus.USER32(?,?,00000005,?,00000000), ref: 00ED51D1
                                                                                                                                                                                                                                              • Part of subcall function 00ED6FBA: DeleteObject.GDI32(00000000), ref: 00ED6FE6
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00ED520D
                                                                                                                                                                                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00ED521A
                                                                                                                                                                                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,00000001), ref: 00ED524D
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001001,00000000,000000FE), ref: 00ED5287
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001026,00000000,000000FE), ref: 00ED5296
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$MessageSend$LongShow$DeleteFocusInvalidateObjectRect
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3210457359-0
                                                                                                                                                                                                                                            • Opcode ID: 5ee5f043e640fff9802f63288cd71322b959af5090fe02bc63ef3fc48bba9302
                                                                                                                                                                                                                                            • Instruction ID: bb6c7b596e60c810477dbd800c52b5380bac80f325720869d2a81d0a01467c1d
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 5ee5f043e640fff9802f63288cd71322b959af5090fe02bc63ef3fc48bba9302
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7F51B032A42A09FEEF209F24CC45BD83BB5EB05365F146013FA24B63E1C371998ADB41
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • LoadImageW.USER32(00000000,?,?,00000010,00000010,00000010), ref: 00E96890
                                                                                                                                                                                                                                            • ExtractIconExW.SHELL32(?,?,00000000,00000000,00000001), ref: 00E968A9
                                                                                                                                                                                                                                            • LoadImageW.USER32(00000000,?,00000001,00000000,00000000,00000050), ref: 00E968B9
                                                                                                                                                                                                                                            • ExtractIconExW.SHELL32(?,?,?,00000000,00000001), ref: 00E968D1
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000080,00000000,00000000), ref: 00E968F2
                                                                                                                                                                                                                                            • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00E58874,00000000,00000000,00000000,000000FF,00000000), ref: 00E96901
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000080,00000001,00000000), ref: 00E9691E
                                                                                                                                                                                                                                            • DestroyIcon.USER32(00000000,?,00000010,00000010,00000010,?,?,?,?,?,00E58874,00000000,00000000,00000000,000000FF,00000000), ref: 00E9692D
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Icon$DestroyExtractImageLoadMessageSend
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1268354404-0
                                                                                                                                                                                                                                            • Opcode ID: ebe2255d40106ef29fda36e1941c4b52d65deadb87561bf40e69b4366d6419ba
                                                                                                                                                                                                                                            • Instruction ID: fe58c51601bd8a988c1cebdfa159795454045e249f7d7e831ea8421b01a003fc
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ebe2255d40106ef29fda36e1941c4b52d65deadb87561bf40e69b4366d6419ba
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: BC519774600209EFDF208F25CC51BAA3BB9FB88765F105919F952B72A0DB70E984DB40
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • InternetConnectW.WININET(?,?,?,?,?,?,00000000,00000000), ref: 00EBC182
                                                                                                                                                                                                                                            • GetLastError.KERNEL32 ref: 00EBC195
                                                                                                                                                                                                                                            • SetEvent.KERNEL32(?), ref: 00EBC1A9
                                                                                                                                                                                                                                              • Part of subcall function 00EBC253: InternetOpenUrlW.WININET(?,?,00000000,00000000,?,00000000), ref: 00EBC272
                                                                                                                                                                                                                                              • Part of subcall function 00EBC253: GetLastError.KERNEL32 ref: 00EBC322
                                                                                                                                                                                                                                              • Part of subcall function 00EBC253: SetEvent.KERNEL32(?), ref: 00EBC336
                                                                                                                                                                                                                                              • Part of subcall function 00EBC253: InternetCloseHandle.WININET(00000000), ref: 00EBC341
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Internet$ErrorEventLast$CloseConnectHandleOpen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 337547030-0
                                                                                                                                                                                                                                            • Opcode ID: 3959f465c13e919dbf8e7c1975526f0207ae7eadfb636f95af5326793091074b
                                                                                                                                                                                                                                            • Instruction ID: e862237edf43b0c3de7e9b45e75631de607145237dcfd871e1dd27a5ea4e5cb0
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 3959f465c13e919dbf8e7c1975526f0207ae7eadfb636f95af5326793091074b
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B231AE71205A01EFDB219FB6ED04AA7BBF9FF58344B20541EF956E6620D730E814DBA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EA3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00EA3A57
                                                                                                                                                                                                                                              • Part of subcall function 00EA3A3D: GetCurrentThreadId.KERNEL32 ref: 00EA3A5E
                                                                                                                                                                                                                                              • Part of subcall function 00EA3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00EA25B3), ref: 00EA3A65
                                                                                                                                                                                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00EA25BD
                                                                                                                                                                                                                                            • PostMessageW.USER32(?,00000100,00000025,00000000), ref: 00EA25DB
                                                                                                                                                                                                                                            • Sleep.KERNEL32(00000000,?,00000100,00000025,00000000), ref: 00EA25DF
                                                                                                                                                                                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00EA25E9
                                                                                                                                                                                                                                            • PostMessageW.USER32(?,00000100,00000027,00000000), ref: 00EA2601
                                                                                                                                                                                                                                            • Sleep.KERNEL32(00000000,?,00000100,00000027,00000000), ref: 00EA2605
                                                                                                                                                                                                                                            • MapVirtualKeyW.USER32(00000025,00000000), ref: 00EA260F
                                                                                                                                                                                                                                            • PostMessageW.USER32(?,00000101,00000027,00000000), ref: 00EA2623
                                                                                                                                                                                                                                            • Sleep.KERNEL32(00000000,?,00000101,00000027,00000000,?,00000100,00000027,00000000), ref: 00EA2627
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessagePostSleepThreadVirtual$AttachCurrentInputProcessWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2014098862-0
                                                                                                                                                                                                                                            • Opcode ID: 2bf182d6245bb70e03e6ce09ed133e6146626363897b8b7c47a716743d6f2550
                                                                                                                                                                                                                                            • Instruction ID: d26dba73aca0b683351b03458e48d0f21d3b053076758dd1a06d3f1ffeb78840
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 2bf182d6245bb70e03e6ce09ed133e6146626363897b8b7c47a716743d6f2550
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: E101D830791320BBFB1067699C8AF597F99DB4EB51F201006F314BF0D1C9E16444CA6A
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000008,0000000C,?,00000000,?,00EA1449,?,?,00000000), ref: 00EA180C
                                                                                                                                                                                                                                            • HeapAlloc.KERNEL32(00000000,?,00EA1449,?,?,00000000), ref: 00EA1813
                                                                                                                                                                                                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00EA1449,?,?,00000000), ref: 00EA1828
                                                                                                                                                                                                                                            • GetCurrentProcess.KERNEL32(?,00000000,?,00EA1449,?,?,00000000), ref: 00EA1830
                                                                                                                                                                                                                                            • DuplicateHandle.KERNEL32(00000000,?,00EA1449,?,?,00000000), ref: 00EA1833
                                                                                                                                                                                                                                            • GetCurrentProcess.KERNEL32(00000000,00000000,00000000,00000002,?,00EA1449,?,?,00000000), ref: 00EA1843
                                                                                                                                                                                                                                            • GetCurrentProcess.KERNEL32(00EA1449,00000000,?,00EA1449,?,?,00000000), ref: 00EA184B
                                                                                                                                                                                                                                            • DuplicateHandle.KERNEL32(00000000,?,00EA1449,?,?,00000000), ref: 00EA184E
                                                                                                                                                                                                                                            • CreateThread.KERNEL32(00000000,00000000,00EA1874,00000000,00000000,00000000), ref: 00EA1868
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Process$Current$DuplicateHandleHeap$AllocCreateThread
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1957940570-0
                                                                                                                                                                                                                                            • Opcode ID: 2ec8ea440af999fb76cddd360519d0aa03b6c25d66d9180e63d94c5733206564
                                                                                                                                                                                                                                            • Instruction ID: 5a47dc6ecb0c89f957f1d9940f7adec5a6182c998889f851c2630b9f5472a180
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 2ec8ea440af999fb76cddd360519d0aa03b6c25d66d9180e63d94c5733206564
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B701C275241315BFE710AF75EC4DF573B6CEB89B51F104451FA05EB192C6749804CB20
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: __alldvrm$_strrchr
                                                                                                                                                                                                                                            • String ID: }}$}}$}}
                                                                                                                                                                                                                                            • API String ID: 1036877536-1495402609
                                                                                                                                                                                                                                            • Opcode ID: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                            • Instruction ID: a298016f6ce550ca3a3934011ff869a4d739e6678305edcb31cd6bcd499797a1
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 190bec492484a18a97fe5f025dcdb3e473ceac46589bc02d4dbe4f94f5be8f6e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 0EA179B1E003869FDB25DF28C8917AEBBE4EF61354F1491ADE59DAB2C1C3348981C751
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EAD4DC: CreateToolhelp32Snapshot.KERNEL32 ref: 00EAD501
                                                                                                                                                                                                                                              • Part of subcall function 00EAD4DC: Process32FirstW.KERNEL32(00000000,?), ref: 00EAD50F
                                                                                                                                                                                                                                              • Part of subcall function 00EAD4DC: CloseHandle.KERNELBASE(00000000), ref: 00EAD5DC
                                                                                                                                                                                                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00ECA16D
                                                                                                                                                                                                                                            • GetLastError.KERNEL32 ref: 00ECA180
                                                                                                                                                                                                                                            • OpenProcess.KERNEL32(00000001,00000000,?), ref: 00ECA1B3
                                                                                                                                                                                                                                            • TerminateProcess.KERNEL32(00000000,00000000), ref: 00ECA268
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(00000000), ref: 00ECA273
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00ECA2C4
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Process$CloseErrorHandleLastOpen$CreateFirstProcess32SnapshotTerminateToolhelp32
                                                                                                                                                                                                                                            • String ID: SeDebugPrivilege
                                                                                                                                                                                                                                            • API String ID: 2533919879-2896544425
                                                                                                                                                                                                                                            • Opcode ID: 6e425605ac2c4b39789c0194e1713e104a5e544c233fea4f831f568e0f08d8d5
                                                                                                                                                                                                                                            • Instruction ID: 876f00ea9c28dfab003b570519960227b1103a7c5e199e1af2a7d974ad0b3f20
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 6e425605ac2c4b39789c0194e1713e104a5e544c233fea4f831f568e0f08d8d5
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: E261CE702092529FD724DF14D594F16BBE1AF4430CF18949CE466ABBA3C776EC4ACB82
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00001036,00000010,00000010), ref: 00ED3925
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00001036,00000000,?), ref: 00ED393A
                                                                                                                                                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000013), ref: 00ED3954
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ED3999
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001057,00000000,?), ref: 00ED39C6
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001061,?,0000000F), ref: 00ED39F4
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$Window_wcslen
                                                                                                                                                                                                                                            • String ID: SysListView32
                                                                                                                                                                                                                                            • API String ID: 2147712094-78025650
                                                                                                                                                                                                                                            • Opcode ID: a5b90bddc5862a55a98c2f60c341889b455a1e93a94775dccbce30ad43ae9b4b
                                                                                                                                                                                                                                            • Instruction ID: cbda60ec0352c8dd25d9804208f83e348b2564014b7e3bd19de0612e0f19ebc8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a5b90bddc5862a55a98c2f60c341889b455a1e93a94775dccbce30ad43ae9b4b
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4D41FC31A00209ABEB219F64CC49BEA7BA9EF08354F101127F958F72C1D7B0DA81CB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00EABCFD
                                                                                                                                                                                                                                            • IsMenu.USER32(00000000), ref: 00EABD1D
                                                                                                                                                                                                                                            • CreatePopupMenu.USER32 ref: 00EABD53
                                                                                                                                                                                                                                            • GetMenuItemCount.USER32(01027C98), ref: 00EABDA4
                                                                                                                                                                                                                                            • InsertMenuItemW.USER32(01027C98,?,00000001,00000030), ref: 00EABDCC
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Menu$Item$CountCreateInfoInsertPopup
                                                                                                                                                                                                                                            • String ID: 0$2
                                                                                                                                                                                                                                            • API String ID: 93392585-3793063076
                                                                                                                                                                                                                                            • Opcode ID: b31b71c0d0b5035d76bdb83c510a7460d8dabd311d0ae8b5ad77363a1b0ba3b6
                                                                                                                                                                                                                                            • Instruction ID: dfb823da3c7afee7ccb9887285d651b024b7f33aa5556310720427865b4d91a8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b31b71c0d0b5035d76bdb83c510a7460d8dabd311d0ae8b5ad77363a1b0ba3b6
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 21518D70A002059BDF10CFB9D884BAEBBF4AF4A358F24525AE411FF292D770A945CB61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00E62D4B
                                                                                                                                                                                                                                            • ___except_validate_context_record.LIBVCRUNTIME ref: 00E62D53
                                                                                                                                                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00E62DE1
                                                                                                                                                                                                                                            • __IsNonwritableInCurrentImage.LIBCMT ref: 00E62E0C
                                                                                                                                                                                                                                            • _ValidateLocalCookies.LIBCMT ref: 00E62E61
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                                                                                                                                                                                                                                            • String ID: &H$csm
                                                                                                                                                                                                                                            • API String ID: 1170836740-1242228090
                                                                                                                                                                                                                                            • Opcode ID: 66d71331d893b4d8ee2ba6df2acec8571e79f0ea7eb553902d293bc957e5a528
                                                                                                                                                                                                                                            • Instruction ID: 1ac4f54686859ad85031b06dc361493fa17f75f03032c07ef95acec7e4abd6b5
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 66d71331d893b4d8ee2ba6df2acec8571e79f0ea7eb553902d293bc957e5a528
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D941F634A406099BCF10DF68E844ADEBBF4BF443A8F149159E914BB392D731DA05CBD0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • LoadIconW.USER32(00000000,00007F03), ref: 00EAC913
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: IconLoad
                                                                                                                                                                                                                                            • String ID: blank$info$question$stop$warning
                                                                                                                                                                                                                                            • API String ID: 2457776203-404129466
                                                                                                                                                                                                                                            • Opcode ID: 094124fdfe9f04892ff9cba257cda3e7bb0aa426aa9f818343b378e59b5fb3ca
                                                                                                                                                                                                                                            • Instruction ID: 4ecd18623a356dad3e42bb1eddddadae5736f8ae779830baa4d2839d826d3ead
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 094124fdfe9f04892ff9cba257cda3e7bb0aa426aa9f818343b378e59b5fb3ca
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 70112B35689307BEE7055B54AC82CEB67DCDF5A358B30102FF504FA2C2EBA4BD006265
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CleanupStartup_strcatgethostbynamegethostnameinet_ntoa
                                                                                                                                                                                                                                            • String ID: 0.0.0.0
                                                                                                                                                                                                                                            • API String ID: 642191829-3771769585
                                                                                                                                                                                                                                            • Opcode ID: 820de0d6413049fca25b9efe819d1070f9c652f0f1a205e2622229ebae08a369
                                                                                                                                                                                                                                            • Instruction ID: b0edc4c278910f00f7b90629c239d76afbdd620ba958834b0aee5513be906a68
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 820de0d6413049fca25b9efe819d1070f9c652f0f1a205e2622229ebae08a369
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 53113A71948115AFCB246B30AC0AEDE77FCDF19364F10116AF406BA091EF70AA81DA50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E59BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E59BB2
                                                                                                                                                                                                                                            • GetSystemMetrics.USER32(0000000F), ref: 00ED9FC7
                                                                                                                                                                                                                                            • GetSystemMetrics.USER32(0000000F), ref: 00ED9FE7
                                                                                                                                                                                                                                            • MoveWindow.USER32(00000003,?,?,?,?,00000000,?,?,?), ref: 00EDA224
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000003,00000142,00000000,0000FFFF), ref: 00EDA242
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000003,00000469,?,00000000), ref: 00EDA263
                                                                                                                                                                                                                                            • ShowWindow.USER32(00000003,00000000), ref: 00EDA282
                                                                                                                                                                                                                                            • InvalidateRect.USER32(?,00000000,00000001), ref: 00EDA2A7
                                                                                                                                                                                                                                            • DefDlgProcW.USER32(?,00000005,?,?), ref: 00EDA2CA
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$MessageMetricsSendSystem$InvalidateLongMoveProcRectShow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1211466189-0
                                                                                                                                                                                                                                            • Opcode ID: 67bb4ecc37ba9cf984a48f366bb9817f8b6853aa02f49b2b659bd612449e5f20
                                                                                                                                                                                                                                            • Instruction ID: 8970cf87e0a430130ec0c9fe8a6d9d77d5dabd283688ee1e627c8d51604ffc35
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 67bb4ecc37ba9cf984a48f366bb9817f8b6853aa02f49b2b659bd612449e5f20
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 82B1B731600219AFDF14CF69C9857AE3BB2FF44705F08907AEC49AB3A5D731AA41CB51
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen$LocalTime
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 952045576-0
                                                                                                                                                                                                                                            • Opcode ID: 1ee220d49d26e52248a42dcb4c3b732b82efe94fddd8a11d0054d4f20bf9d5f1
                                                                                                                                                                                                                                            • Instruction ID: 9643025c03bf2f63c07f79b96ff80355545f462ffe9133af136c9f9b9d56b249
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 1ee220d49d26e52248a42dcb4c3b732b82efe94fddd8a11d0054d4f20bf9d5f1
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: F041BE65C5021876DB11EBB49C8A9CFB3ECAF46340F50A462E518F3262FB34E245C3A6
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00E9682C,00000004,00000000,00000000), ref: 00E5F953
                                                                                                                                                                                                                                            • ShowWindow.USER32(FFFFFFFF,00000006,?,00000000,?,00E9682C,00000004,00000000,00000000), ref: 00E9F3D1
                                                                                                                                                                                                                                            • ShowWindow.USER32(FFFFFFFF,000000FF,?,00000000,?,00E9682C,00000004,00000000,00000000), ref: 00E9F454
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ShowWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1268545403-0
                                                                                                                                                                                                                                            • Opcode ID: 9c889b5849421cc5a78b8accd82a1dda02d3225aa3e1c93419c8650b14f49bb6
                                                                                                                                                                                                                                            • Instruction ID: 17a4e69865342fde6c06e6f83e885f2161124e0fc2c15a93f66fa64921cd8021
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9c889b5849421cc5a78b8accd82a1dda02d3225aa3e1c93419c8650b14f49bb6
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: E6414031504A80BECB348B79D9887AA7BD1BBD635AF14783DE857B2560C671D488C711
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • DeleteObject.GDI32(00000000), ref: 00ED2D1B
                                                                                                                                                                                                                                            • GetDC.USER32(00000000), ref: 00ED2D23
                                                                                                                                                                                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00ED2D2E
                                                                                                                                                                                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 00ED2D3A
                                                                                                                                                                                                                                            • CreateFontW.GDI32(?,00000000,00000000,00000000,?,00000000,00000000,00000000,00000001,00000004,00000000,?,00000000,?), ref: 00ED2D76
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000030,00000000,00000001), ref: 00ED2D87
                                                                                                                                                                                                                                            • MoveWindow.USER32(?,?,?,?,?,00000000,?,?,00ED5A65,?,?,000000FF,00000000,?,000000FF,?), ref: 00ED2DC2
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000142,00000000,00000000), ref: 00ED2DE1
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$CapsCreateDeleteDeviceFontMoveObjectReleaseWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3864802216-0
                                                                                                                                                                                                                                            • Opcode ID: 9ac7d97e943a787bd0c943834d328580d70de4825014d392990d932fa325d548
                                                                                                                                                                                                                                            • Instruction ID: 6bcfc957c7d86159057803afc26c3bd19136da4c2ebb8367243c2336d6e2f487
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9ac7d97e943a787bd0c943834d328580d70de4825014d392990d932fa325d548
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: BC31AE72202214BFEB118F51DC8AFEB3FADEF19755F144056FE08AA291C6759C41CBA1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _memcmp
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2931989736-0
                                                                                                                                                                                                                                            • Opcode ID: 87a98ab4f77f0d3fec6f0d8f83887b5ec44708487b3e162d553a5faf3d89ff34
                                                                                                                                                                                                                                            • Instruction ID: fda035ffbc755e9b7ae9aabebd4edf0ed6b81a3062c308f632feb057ea846190
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 87a98ab4f77f0d3fec6f0d8f83887b5ec44708487b3e162d553a5faf3d89ff34
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D121DA636C0B05B7D21595105E82FFA739CEF6A388F456022FD067E741F720FD1181A5
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID: NULL Pointer assignment$Not an Object type
                                                                                                                                                                                                                                            • API String ID: 0-572801152
                                                                                                                                                                                                                                            • Opcode ID: fba874f717cb0d16cb5b44a56b4d4088ddf53eb22d647b5e4c867db81bd30de1
                                                                                                                                                                                                                                            • Instruction ID: 1e86bbe561bc673312c02fc4999c90f1698d9087d93bf410a067c62f713dbf0d
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: fba874f717cb0d16cb5b44a56b4d4088ddf53eb22d647b5e4c867db81bd30de1
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: FFD1AE72A0060A9FDF14CF98C981FAEB7B5BF48344F14906DE915BB281D772E986CB50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetCPInfo.KERNEL32(?,?), ref: 00E815CE
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00E81651
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00E816E4
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,?,00000000,00000000), ref: 00E816FB
                                                                                                                                                                                                                                              • Part of subcall function 00E73820: RtlAllocateHeap.NTDLL(00000000,?,00F11444,?,00E5FDF5,?,?,00E4A976,00000010,00F11440,00E413FC,?,00E413C6,?,00E41129), ref: 00E73852
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00E81777
                                                                                                                                                                                                                                            • __freea.LIBCMT ref: 00E817A2
                                                                                                                                                                                                                                            • __freea.LIBCMT ref: 00E817AE
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ByteCharMultiWide$__freea$AllocateHeapInfo
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2829977744-0
                                                                                                                                                                                                                                            • Opcode ID: 6f086f8591e48f68ac799a6befb344f564a33e25fc80df3a074a84fa0b24a662
                                                                                                                                                                                                                                            • Instruction ID: 11a2eb21246f0f0dc470b831a69aeae5bbb9861f86c31c94da705990384db0db
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 6f086f8591e48f68ac799a6befb344f564a33e25fc80df3a074a84fa0b24a662
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4991B371E002169ADB20AF74D841AEE7BF9EF49354F18669AE80DF7181D735CC42CB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Variant$ClearInit
                                                                                                                                                                                                                                            • String ID: Incorrect Object type in FOR..IN loop$Null Object assignment in FOR..IN loop
                                                                                                                                                                                                                                            • API String ID: 2610073882-625585964
                                                                                                                                                                                                                                            • Opcode ID: 03e55d9571eff613d31da6eea4601381fff0673cd09b19594be8faf30909afc3
                                                                                                                                                                                                                                            • Instruction ID: 6f7d13fc56f42cabc31211c69096c2a5cf8e90b28dcb1bc5e00a930786e8469e
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 03e55d9571eff613d31da6eea4601381fff0673cd09b19594be8faf30909afc3
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 1091ADB0A00219ABDF20CFA4C954FAEBBB8EF46714F10955EF505BB2C0D7719946CBA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SafeArrayGetVartype.OLEAUT32(00000001,?), ref: 00EB125C
                                                                                                                                                                                                                                            • SafeArrayAccessData.OLEAUT32(00000000,?), ref: 00EB1284
                                                                                                                                                                                                                                            • SafeArrayUnaccessData.OLEAUT32(00000001), ref: 00EB12A8
                                                                                                                                                                                                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00EB12D8
                                                                                                                                                                                                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00EB135F
                                                                                                                                                                                                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00EB13C4
                                                                                                                                                                                                                                            • SafeArrayAccessData.OLEAUT32(00000001,?), ref: 00EB1430
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ArraySafe$Data$Access$UnaccessVartype
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2550207440-0
                                                                                                                                                                                                                                            • Opcode ID: b8ac6cc66389ba997798a86999b0885c221b0b2a43c6ed857eb3911350a25d8f
                                                                                                                                                                                                                                            • Instruction ID: f32a3651642e62ab668c47e07d71f204be6c88a9943d20c0f46bfeac11c5ac5b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b8ac6cc66389ba997798a86999b0885c221b0b2a43c6ed857eb3911350a25d8f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: F191DD71A00219AFDB009FA8D8A4BEFB7F5FF45325F1050A9E910FB2A1D774A941CB90
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3225163088-0
                                                                                                                                                                                                                                            • Opcode ID: a3dc267ffcffdee285cf28971c9187ac05f76f1311874feb813d93315e5de164
                                                                                                                                                                                                                                            • Instruction ID: 0e453b04db58b4d5fd563277b4b9d1e65502f9a7c9c2efbed517fef6e045b4ca
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a3dc267ffcffdee285cf28971c9187ac05f76f1311874feb813d93315e5de164
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 1A914871D00219EFCB10CFA9CC84AEEBBB8FF48320F149555E915B7252D378A955CB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • VariantInit.OLEAUT32(?), ref: 00EC396B
                                                                                                                                                                                                                                            • CharUpperBuffW.USER32(?,?), ref: 00EC3A7A
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EC3A8A
                                                                                                                                                                                                                                            • VariantClear.OLEAUT32(?), ref: 00EC3C1F
                                                                                                                                                                                                                                              • Part of subcall function 00EB0CDF: VariantInit.OLEAUT32(00000000), ref: 00EB0D1F
                                                                                                                                                                                                                                              • Part of subcall function 00EB0CDF: VariantCopy.OLEAUT32(?,?), ref: 00EB0D28
                                                                                                                                                                                                                                              • Part of subcall function 00EB0CDF: VariantClear.OLEAUT32(?), ref: 00EB0D34
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Variant$ClearInit$BuffCharCopyUpper_wcslen
                                                                                                                                                                                                                                            • String ID: AUTOIT.ERROR$Incorrect Parameter format
                                                                                                                                                                                                                                            • API String ID: 4137639002-1221869570
                                                                                                                                                                                                                                            • Opcode ID: 46173c3f5c924353c4c125bc43a581e26bc242be226a33525d385cc9a129431c
                                                                                                                                                                                                                                            • Instruction ID: cc4406ed9777d18d69dcd13f6d30c68630b009058372202029bcfe71564db454
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 46173c3f5c924353c4c125bc43a581e26bc242be226a33525d385cc9a129431c
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 21915A75A083019FC704EF24C580A6AB7E5FF89314F14996DF889AB351DB31EE46CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EA000E: CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E9FF41,80070057,?,?,?,00EA035E), ref: 00EA002B
                                                                                                                                                                                                                                              • Part of subcall function 00EA000E: ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E9FF41,80070057,?,?), ref: 00EA0046
                                                                                                                                                                                                                                              • Part of subcall function 00EA000E: lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E9FF41,80070057,?,?), ref: 00EA0054
                                                                                                                                                                                                                                              • Part of subcall function 00EA000E: CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E9FF41,80070057,?), ref: 00EA0064
                                                                                                                                                                                                                                            • CoInitializeSecurity.OLE32(00000000,000000FF,00000000,00000000,00000002,00000003,00000000,00000000,00000000,00000001,?,?), ref: 00EC4C51
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EC4D59
                                                                                                                                                                                                                                            • CoCreateInstanceEx.OLE32(?,00000000,00000015,?,00000001,?), ref: 00EC4DCF
                                                                                                                                                                                                                                            • CoTaskMemFree.OLE32(?), ref: 00EC4DDA
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: FreeFromProgTask$CreateInitializeInstanceSecurity_wcslenlstrcmpi
                                                                                                                                                                                                                                            • String ID: NULL Pointer assignment
                                                                                                                                                                                                                                            • API String ID: 614568839-2785691316
                                                                                                                                                                                                                                            • Opcode ID: b42a7e126d594fe774e103495b45504c0fccda28c9ae7a06134cd3d9b5fb171a
                                                                                                                                                                                                                                            • Instruction ID: 7efb8c24e2c97cb7b04f166fdae6ef54f90bdab476d32a45d15506d1e6acc57f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b42a7e126d594fe774e103495b45504c0fccda28c9ae7a06134cd3d9b5fb171a
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: DD9127B1D002199FDF14DFA4D890EEEBBB8BF08314F10516AE915BB291DB315A45CF60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetMenu.USER32(?), ref: 00ED2183
                                                                                                                                                                                                                                            • GetMenuItemCount.USER32(00000000), ref: 00ED21B5
                                                                                                                                                                                                                                            • GetMenuStringW.USER32(00000000,00000000,?,00007FFF,00000400), ref: 00ED21DD
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ED2213
                                                                                                                                                                                                                                            • GetMenuItemID.USER32(?,?), ref: 00ED224D
                                                                                                                                                                                                                                            • GetSubMenu.USER32(?,?), ref: 00ED225B
                                                                                                                                                                                                                                              • Part of subcall function 00EA3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00EA3A57
                                                                                                                                                                                                                                              • Part of subcall function 00EA3A3D: GetCurrentThreadId.KERNEL32 ref: 00EA3A5E
                                                                                                                                                                                                                                              • Part of subcall function 00EA3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00EA25B3), ref: 00EA3A65
                                                                                                                                                                                                                                            • PostMessageW.USER32(?,00000111,00000000,00000000), ref: 00ED22E3
                                                                                                                                                                                                                                              • Part of subcall function 00EAE97B: Sleep.KERNEL32 ref: 00EAE9F3
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Menu$Thread$Item$AttachCountCurrentInputMessagePostProcessSleepStringWindow_wcslen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 4196846111-0
                                                                                                                                                                                                                                            • Opcode ID: 4f4842532712c5f4bd8a1d31904b713a750185943ef47068c2afe819a66b4406
                                                                                                                                                                                                                                            • Instruction ID: 0de30793a11257d6f62fff956cdd1e6efde87e5d80f42686aa8eac7ddb070936
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 4f4842532712c5f4bd8a1d31904b713a750185943ef47068c2afe819a66b4406
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: A8719D35A00205AFCB10DF64C841AAEB7F5EF98310F14945EEA26FB351DB35EE428B90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • IsWindow.USER32(01027EA0), ref: 00ED7F37
                                                                                                                                                                                                                                            • IsWindowEnabled.USER32(01027EA0), ref: 00ED7F43
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,0000041C,00000000,00000000), ref: 00ED801E
                                                                                                                                                                                                                                            • SendMessageW.USER32(01027EA0,000000B0,?,?), ref: 00ED8051
                                                                                                                                                                                                                                            • IsDlgButtonChecked.USER32(?,?), ref: 00ED8089
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(01027EA0,000000EC), ref: 00ED80AB
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000000A1,00000002,00000000), ref: 00ED80C3
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSendWindow$ButtonCheckedEnabledLong
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 4072528602-0
                                                                                                                                                                                                                                            • Opcode ID: 3d8a39e4fd668ed8973ca399504cf480b6e3cd377f430eef1687e145196c8a68
                                                                                                                                                                                                                                            • Instruction ID: 98cf63a531aeb161e3d019394570066d928e9997c117445b177eed20927dfdf8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 3d8a39e4fd668ed8973ca399504cf480b6e3cd377f430eef1687e145196c8a68
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B571BF34608204AFEB319F54C984FEABBB5FF09344F14505BE995B73A1DB31A84ADB10
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetParent.USER32(?), ref: 00EAAEF9
                                                                                                                                                                                                                                            • GetKeyboardState.USER32(?), ref: 00EAAF0E
                                                                                                                                                                                                                                            • SetKeyboardState.USER32(?), ref: 00EAAF6F
                                                                                                                                                                                                                                            • PostMessageW.USER32(?,00000101,00000010,?), ref: 00EAAF9D
                                                                                                                                                                                                                                            • PostMessageW.USER32(?,00000101,00000011,?), ref: 00EAAFBC
                                                                                                                                                                                                                                            • PostMessageW.USER32(?,00000101,00000012,?), ref: 00EAAFFD
                                                                                                                                                                                                                                            • PostMessageW.USER32(?,00000101,0000005B,?), ref: 00EAB020
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 87235514-0
                                                                                                                                                                                                                                            • Opcode ID: d3742b4b2d6e4adced2cae38e52fbe23e7872cc49037d31ba46e06b0cbc4ba06
                                                                                                                                                                                                                                            • Instruction ID: 64a21f1a8dd9cef2de80d49d4351d7782b9e8f8bbdde54ad4533e17f07b9ce19
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: d3742b4b2d6e4adced2cae38e52fbe23e7872cc49037d31ba46e06b0cbc4ba06
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2851A1A06047D57DFB364234CC45BBABEE95B0B308F0C959AE1E9694D3C398B8C8D761
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetParent.USER32(00000000), ref: 00EAAD19
                                                                                                                                                                                                                                            • GetKeyboardState.USER32(?), ref: 00EAAD2E
                                                                                                                                                                                                                                            • SetKeyboardState.USER32(?), ref: 00EAAD8F
                                                                                                                                                                                                                                            • PostMessageW.USER32(00000000,00000100,00000010,?), ref: 00EAADBB
                                                                                                                                                                                                                                            • PostMessageW.USER32(00000000,00000100,00000011,?), ref: 00EAADD8
                                                                                                                                                                                                                                            • PostMessageW.USER32(00000000,00000100,00000012,?), ref: 00EAAE17
                                                                                                                                                                                                                                            • PostMessageW.USER32(00000000,00000100,0000005B,?), ref: 00EAAE38
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessagePost$KeyboardState$Parent
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 87235514-0
                                                                                                                                                                                                                                            • Opcode ID: cd6c720ed9dbd346596bca661c55961ea46415057befb20c3c27c122e0934c1f
                                                                                                                                                                                                                                            • Instruction ID: 0bb846b9dcbcafe2b78f4a2e6e01b234125d7dd69c170b7bbffdad4ee7b587c0
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: cd6c720ed9dbd346596bca661c55961ea46415057befb20c3c27c122e0934c1f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C651B1A15047D53DFB3782248C55B7ABEE85B4B308F0CA499E1D56E8C2D394FC88E762
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetConsoleCP.KERNEL32(00E83CD6,?,?,?,?,?,?,?,?,00E75BA3,?,?,00E83CD6,?,?), ref: 00E75470
                                                                                                                                                                                                                                            • __fassign.LIBCMT ref: 00E754EB
                                                                                                                                                                                                                                            • __fassign.LIBCMT ref: 00E75506
                                                                                                                                                                                                                                            • WideCharToMultiByte.KERNEL32(?,00000000,?,00000001,00E83CD6,00000005,00000000,00000000), ref: 00E7552C
                                                                                                                                                                                                                                            • WriteFile.KERNEL32(?,00E83CD6,00000000,00E75BA3,00000000,?,?,?,?,?,?,?,?,?,00E75BA3,?), ref: 00E7554B
                                                                                                                                                                                                                                            • WriteFile.KERNEL32(?,?,00000001,00E75BA3,00000000,?,?,?,?,?,?,?,?,?,00E75BA3,?), ref: 00E75584
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: FileWrite__fassign$ByteCharConsoleMultiWide
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1324828854-0
                                                                                                                                                                                                                                            • Opcode ID: b1d2584cd52ba57a4b2f81552fd9a4ddb0389c3d9d7cd78d477568355f725ea2
                                                                                                                                                                                                                                            • Instruction ID: 08ea1f466b4951d206d57d74364a43a5c3d74fc5251e306170f658535b1c9d7d
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b1d2584cd52ba57a4b2f81552fd9a4ddb0389c3d9d7cd78d477568355f725ea2
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: A951C371A006499FDB10CFA8D845AEEBBF9EF09300F14915AF959F7291E7709A41CF60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EC304E: inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00EC307A
                                                                                                                                                                                                                                              • Part of subcall function 00EC304E: _wcslen.LIBCMT ref: 00EC309B
                                                                                                                                                                                                                                            • socket.WSOCK32(00000002,00000001,00000006,?,?,00000000), ref: 00EC1112
                                                                                                                                                                                                                                            • WSAGetLastError.WSOCK32 ref: 00EC1121
                                                                                                                                                                                                                                            • WSAGetLastError.WSOCK32 ref: 00EC11C9
                                                                                                                                                                                                                                            • closesocket.WSOCK32(00000000), ref: 00EC11F9
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorLast$_wcslenclosesocketinet_addrsocket
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2675159561-0
                                                                                                                                                                                                                                            • Opcode ID: b3d58cc91b204d878eac776423f070a1d24fd37a0032fef4d6c23c93e09f3784
                                                                                                                                                                                                                                            • Instruction ID: c6ee3c473a1b174a36258815ca5a08abbf64193c667d71cf6c4ed9a0d421e5e8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b3d58cc91b204d878eac776423f070a1d24fd37a0032fef4d6c23c93e09f3784
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 31412631201205AFDB109F24D944FA9B7E9EF42368F188099FD15BB282C779ED46CBE0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EADDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00EACF22,?), ref: 00EADDFD
                                                                                                                                                                                                                                              • Part of subcall function 00EADDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00EACF22,?), ref: 00EADE16
                                                                                                                                                                                                                                            • lstrcmpiW.KERNEL32(?,?), ref: 00EACF45
                                                                                                                                                                                                                                            • MoveFileW.KERNEL32(?,?), ref: 00EACF7F
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EAD005
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EAD01B
                                                                                                                                                                                                                                            • SHFileOperationW.SHELL32(?), ref: 00EAD061
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: FileFullNamePath_wcslen$MoveOperationlstrcmpi
                                                                                                                                                                                                                                            • String ID: \*.*
                                                                                                                                                                                                                                            • API String ID: 3164238972-1173974218
                                                                                                                                                                                                                                            • Opcode ID: 43f4a9803427c3664b6eb5cfb1c8234cdb01baa90abffc9ba1204462a19c1b0d
                                                                                                                                                                                                                                            • Instruction ID: bdb834b0035608c79aa57c4a8aff04b30b679d09253491f862cd5c4f839c9b27
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 43f4a9803427c3664b6eb5cfb1c8234cdb01baa90abffc9ba1204462a19c1b0d
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 854163759452199EDF12EBA4DD81ADEB7F9AF0D380F1010E6E505FF142EA34BA48CB50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000000F0,00000000,00000000), ref: 00ED2E1C
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00ED2E4F
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00ED2E84
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000000F1,00000000,00000000), ref: 00ED2EB6
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000000F1,00000001,00000000), ref: 00ED2EE0
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00ED2EF1
                                                                                                                                                                                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00ED2F0B
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: LongWindow$MessageSend
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2178440468-0
                                                                                                                                                                                                                                            • Opcode ID: c1e0075132796b7b62d1594597beceb35ed3730008d737b31ed8f1b40e8913f8
                                                                                                                                                                                                                                            • Instruction ID: cffaae7062b80b5f2377fe1877905cc5de853d2bb572238bc47f7e64c5d4331e
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: c1e0075132796b7b62d1594597beceb35ed3730008d737b31ed8f1b40e8913f8
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: F53137306451459FEB22CF19DC84FA537E0FBAAB14F1551AAFA10AB2B1CB71E841EB01
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00EA7769
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00EA778F
                                                                                                                                                                                                                                            • SysAllocString.OLEAUT32(00000000), ref: 00EA7792
                                                                                                                                                                                                                                            • SysAllocString.OLEAUT32(?), ref: 00EA77B0
                                                                                                                                                                                                                                            • SysFreeString.OLEAUT32(?), ref: 00EA77B9
                                                                                                                                                                                                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 00EA77DE
                                                                                                                                                                                                                                            • SysAllocString.OLEAUT32(?), ref: 00EA77EC
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3761583154-0
                                                                                                                                                                                                                                            • Opcode ID: 74c01dd1f958baa31819a2ebdab047c044d38dc8d98076badaa8cf72bb50b37b
                                                                                                                                                                                                                                            • Instruction ID: 5381c3f32a7bfa77aa367c67d9c6589896e3728b2c8d3e7874a64ec91569e37d
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 74c01dd1f958baa31819a2ebdab047c044d38dc8d98076badaa8cf72bb50b37b
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: BD21DE3660921AAFDB00DFA8DC88CFB33ECEB0A3A47108026FA54EB150D670EC45C760
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00EA7842
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(00000000,00000000,?,000000FF,00000000,00000000), ref: 00EA7868
                                                                                                                                                                                                                                            • SysAllocString.OLEAUT32(00000000), ref: 00EA786B
                                                                                                                                                                                                                                            • SysAllocString.OLEAUT32 ref: 00EA788C
                                                                                                                                                                                                                                            • SysFreeString.OLEAUT32 ref: 00EA7895
                                                                                                                                                                                                                                            • StringFromGUID2.OLE32(?,?,00000028), ref: 00EA78AF
                                                                                                                                                                                                                                            • SysAllocString.OLEAUT32(?), ref: 00EA78BD
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: String$Alloc$ByteCharMultiWide$FreeFrom
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3761583154-0
                                                                                                                                                                                                                                            • Opcode ID: 2b28f11060b50380d8f4d2422a9a8e6e56223b134679c835965ec5b9bcbf9b72
                                                                                                                                                                                                                                            • Instruction ID: 8dee8932953ff464b1bf56c7147d45b52a0cab070113167c2947fcc016d2c439
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 2b28f11060b50380d8f4d2422a9a8e6e56223b134679c835965ec5b9bcbf9b72
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 8721F131608215AFDB14DFA8DC88CAA77ECEF0E3607108125F910EF2A0DA78EC44CB64
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetStdHandle.KERNEL32(0000000C), ref: 00EB04F2
                                                                                                                                                                                                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00EB052E
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CreateHandlePipe
                                                                                                                                                                                                                                            • String ID: nul
                                                                                                                                                                                                                                            • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                            • Opcode ID: 96d951cc77f723bc107fab92b26bf372136fa59dcf3d58d31a082d27d7671191
                                                                                                                                                                                                                                            • Instruction ID: 1f4911eb983a6fd0b481e5ae044077419c55709775b4006c441bf68bfe2921e0
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 96d951cc77f723bc107fab92b26bf372136fa59dcf3d58d31a082d27d7671191
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 24215CB5501306AFDB309F69DC44ADB77E4AF44768F204A19E9A1F62E0D770A944CF20
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetStdHandle.KERNEL32(000000F6), ref: 00EB05C6
                                                                                                                                                                                                                                            • CreatePipe.KERNEL32(?,?,0000000C,00000000), ref: 00EB0601
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CreateHandlePipe
                                                                                                                                                                                                                                            • String ID: nul
                                                                                                                                                                                                                                            • API String ID: 1424370930-2873401336
                                                                                                                                                                                                                                            • Opcode ID: 34177229644d88f0d70f42d21cdbedfa568b42b61661ab9fa3876513ad2e1e94
                                                                                                                                                                                                                                            • Instruction ID: a39fd1d75259ba30cd029af6fe82df90c8fd69112c3ef0c30b0f284ffb6163f3
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 34177229644d88f0d70f42d21cdbedfa568b42b61661ab9fa3876513ad2e1e94
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B2217F755003069FDB209F699C04ADB77E4BF95764F201B19E9A1F72E4D770A860CB10
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E4600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00E4604C
                                                                                                                                                                                                                                              • Part of subcall function 00E4600E: GetStockObject.GDI32(00000011), ref: 00E46060
                                                                                                                                                                                                                                              • Part of subcall function 00E4600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E4606A
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00002001,00000000,FF000000), ref: 00ED4112
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000409,00000000,FF000000), ref: 00ED411F
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000402,00000000,00000000), ref: 00ED412A
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000401,00000000,00640000), ref: 00ED4139
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000404,00000001,00000000), ref: 00ED4145
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$CreateObjectStockWindow
                                                                                                                                                                                                                                            • String ID: Msctls_Progress32
                                                                                                                                                                                                                                            • API String ID: 1025951953-3636473452
                                                                                                                                                                                                                                            • Opcode ID: a5bd4d371bd1cf06cb0e63985d166ef12192f33427c05433a47883f97ac5021f
                                                                                                                                                                                                                                            • Instruction ID: 2a944d1e6c4f87751a5925e6be0c4e2622ce37e05e1d9d857edb217d5ed187cf
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a5bd4d371bd1cf06cb0e63985d166ef12192f33427c05433a47883f97ac5021f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: F31193B2150219BFEF119E64CC85EE77FADEF18798F015111B718A2190C672DC21DBA4
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E7D7A3: _free.LIBCMT ref: 00E7D7CC
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7D82D
                                                                                                                                                                                                                                              • Part of subcall function 00E729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00E7D7D1,00000000,00000000,00000000,00000000,?,00E7D7F8,00000000,00000007,00000000,?,00E7DBF5,00000000), ref: 00E729DE
                                                                                                                                                                                                                                              • Part of subcall function 00E729C8: GetLastError.KERNEL32(00000000,?,00E7D7D1,00000000,00000000,00000000,00000000,?,00E7D7F8,00000000,00000007,00000000,?,00E7DBF5,00000000,00000000), ref: 00E729F0
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7D838
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7D843
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7D897
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7D8A2
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7D8AD
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7D8B8
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 776569668-0
                                                                                                                                                                                                                                            • Opcode ID: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                                            • Instruction ID: 011f3f40f8d44a1f048a904bc20134d84f79604b1242c55b2019989e3726f615
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: d5e9bbcb1dbdafe4c8d3bd98f36014f41f46dc5d4a3df644b036f3c2391e0fc8
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B7115E71544B04AAD625FFB4CC47FCBBBECAF80700F44982AF39DB6092DA65B5458760
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetModuleHandleW.KERNEL32(00000000,?,?,00000100,00000000), ref: 00EADA74
                                                                                                                                                                                                                                            • LoadStringW.USER32(00000000), ref: 00EADA7B
                                                                                                                                                                                                                                            • GetModuleHandleW.KERNEL32(00000000,00001389,?,00000100), ref: 00EADA91
                                                                                                                                                                                                                                            • LoadStringW.USER32(00000000), ref: 00EADA98
                                                                                                                                                                                                                                            • MessageBoxW.USER32(00000000,?,?,00011010), ref: 00EADADC
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            • %s (%d) : ==> %s: %s %s, xrefs: 00EADAB9
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: HandleLoadModuleString$Message
                                                                                                                                                                                                                                            • String ID: %s (%d) : ==> %s: %s %s
                                                                                                                                                                                                                                            • API String ID: 4072794657-3128320259
                                                                                                                                                                                                                                            • Opcode ID: d4d4676b85d8c7708552735d5f5db3d1754e49e1ec5e28122f05acd26995d2f9
                                                                                                                                                                                                                                            • Instruction ID: 86aa0f2e761d5b46082847452e6cccf3916435cb00e85ef6bdce3dc257fdbf9a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: d4d4676b85d8c7708552735d5f5db3d1754e49e1ec5e28122f05acd26995d2f9
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 690162F65002197FE7109BA0AD89EEB776CEB09741F500592B716F6081EA74AE888F74
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • InterlockedExchange.KERNEL32(0101FFA0,0101FFA0), ref: 00EB097B
                                                                                                                                                                                                                                            • EnterCriticalSection.KERNEL32(0101FF80,00000000), ref: 00EB098D
                                                                                                                                                                                                                                            • TerminateThread.KERNEL32(?,000001F6), ref: 00EB099B
                                                                                                                                                                                                                                            • WaitForSingleObject.KERNEL32(?,000003E8), ref: 00EB09A9
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00EB09B8
                                                                                                                                                                                                                                            • InterlockedExchange.KERNEL32(0101FFA0,000001F6), ref: 00EB09C8
                                                                                                                                                                                                                                            • LeaveCriticalSection.KERNEL32(0101FF80), ref: 00EB09CF
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CriticalExchangeInterlockedSection$CloseEnterHandleLeaveObjectSingleTerminateThreadWait
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3495660284-0
                                                                                                                                                                                                                                            • Opcode ID: 9218f37f30d8eb2c7ef6a692d95781085852642f6b3f28d6afffd525848183be
                                                                                                                                                                                                                                            • Instruction ID: 44d6566f0f21e971f22311cdcd547c165a7fb50712dd13f3a6515fb0fca00771
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9218f37f30d8eb2c7ef6a692d95781085852642f6b3f28d6afffd525848183be
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: FEF01D31483913AFD7515B95EE88BD67B35FF41742F502116F101B08B1C774A469CF90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetClientRect.USER32(?,?), ref: 00E45D30
                                                                                                                                                                                                                                            • GetWindowRect.USER32(?,?), ref: 00E45D71
                                                                                                                                                                                                                                            • ScreenToClient.USER32(?,?), ref: 00E45D99
                                                                                                                                                                                                                                            • GetClientRect.USER32(?,?), ref: 00E45ED7
                                                                                                                                                                                                                                            • GetWindowRect.USER32(?,?), ref: 00E45EF8
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Rect$Client$Window$Screen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1296646539-0
                                                                                                                                                                                                                                            • Opcode ID: dd4a675fb4208d651e64e3bd88e8911cfdf4970acac869bda8ef469ce336cb42
                                                                                                                                                                                                                                            • Instruction ID: 983f76d339ba2abed68a21bdb3157202d52da9b479051533ea5737851a06988a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: dd4a675fb4208d651e64e3bd88e8911cfdf4970acac869bda8ef469ce336cb42
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 6BB17975A0074ADFDB14DFA9D4807EAB7F1FF48314F14A41AE8A9E7290DB34AA41CB50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • __allrem.LIBCMT ref: 00E700BA
                                                                                                                                                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E700D6
                                                                                                                                                                                                                                            • __allrem.LIBCMT ref: 00E700ED
                                                                                                                                                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E7010B
                                                                                                                                                                                                                                            • __allrem.LIBCMT ref: 00E70122
                                                                                                                                                                                                                                            • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 00E70140
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Unothrow_t@std@@@__allrem__ehfuncinfo$??2@
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1992179935-0
                                                                                                                                                                                                                                            • Opcode ID: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                                                                                                                                                                            • Instruction ID: f17930a8099cba36ff5f834a769c489e17097516d9d3bf99dea1af598bdd60a9
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: c0aa086816e9a6b10c8594d9af3fc1b6618250ddc70608c46d0048b3e4fbc764
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 8A812871B00706DBE724AF68DC41B6B73E9AF41368F24A53EF559F6281E7B0D9008B50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EC3149: select.WSOCK32(00000000,?,00000000,00000000,?,?,?,00000000,?,?,?,00EC101C,00000000,?,?,00000000), ref: 00EC3195
                                                                                                                                                                                                                                            • __WSAFDIsSet.WSOCK32(00000000,?,00000000,00000000,?,00000064,00000000), ref: 00EC1DC0
                                                                                                                                                                                                                                            • #17.WSOCK32(00000000,?,?,00000000,?,00000010), ref: 00EC1DE1
                                                                                                                                                                                                                                            • WSAGetLastError.WSOCK32 ref: 00EC1DF2
                                                                                                                                                                                                                                            • inet_ntoa.WSOCK32(?), ref: 00EC1E8C
                                                                                                                                                                                                                                            • htons.WSOCK32(?,?,?,?,?), ref: 00EC1EDB
                                                                                                                                                                                                                                            • _strlen.LIBCMT ref: 00EC1F35
                                                                                                                                                                                                                                              • Part of subcall function 00EA39E8: _strlen.LIBCMT ref: 00EA39F2
                                                                                                                                                                                                                                              • Part of subcall function 00E46D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,00000000,00000002,?,?,?,?,00E5CF58,?,?,?), ref: 00E46DBA
                                                                                                                                                                                                                                              • Part of subcall function 00E46D9E: MultiByteToWideChar.KERNEL32(00000000,00000001,?,?,00000000,?,?,?,00E5CF58,?,?,?), ref: 00E46DED
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ByteCharMultiWide_strlen$ErrorLasthtonsinet_ntoaselect
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1923757996-0
                                                                                                                                                                                                                                            • Opcode ID: bf006fc5e04cc1f1718f4417e19c9f20697e6238a9a31d6bda3075375d2f32bf
                                                                                                                                                                                                                                            • Instruction ID: f4105e690a833c493e9aafd222be081fa7e9d8b48ed26a0404cd611190a861f1
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: bf006fc5e04cc1f1718f4417e19c9f20697e6238a9a31d6bda3075375d2f32bf
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 93A1D331604340AFC314DF24D885F6AB7E5AF85318F54A98CF4566B2A3CB32ED46CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000000,?,?,00000000,00000000,?,00E682D9,00E682D9,?,?,?,00E7644F,00000001,00000001,?), ref: 00E76258
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(00000001,00000001,?,?,00000000,?,?,?,?,00E7644F,00000001,00000001,?,?,?,?), ref: 00E762DE
                                                                                                                                                                                                                                            • WideCharToMultiByte.KERNEL32(00000001,00000000,00000000,00000000,?,?,00000000,00000000,?,00000400,00000000,?,00000000,00000000,00000000,00000000), ref: 00E763D8
                                                                                                                                                                                                                                            • __freea.LIBCMT ref: 00E763E5
                                                                                                                                                                                                                                              • Part of subcall function 00E73820: RtlAllocateHeap.NTDLL(00000000,?,00F11444,?,00E5FDF5,?,?,00E4A976,00000010,00F11440,00E413FC,?,00E413C6,?,00E41129), ref: 00E73852
                                                                                                                                                                                                                                            • __freea.LIBCMT ref: 00E763EE
                                                                                                                                                                                                                                            • __freea.LIBCMT ref: 00E76413
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ByteCharMultiWide__freea$AllocateHeap
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1414292761-0
                                                                                                                                                                                                                                            • Opcode ID: 18246aebe001c43b35eeaa7687d007a59f999b4a7f398e88f72ee94894b76a00
                                                                                                                                                                                                                                            • Instruction ID: 90ae7889a8b5f0f0e2f1ec6fbc365116a29fa2849fc69243361c20133a57b950
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 18246aebe001c43b35eeaa7687d007a59f999b4a7f398e88f72ee94894b76a00
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: A8510272600616BFEB258F64DC81EAF77A9EB84758F249229FC09F6150EB34DC44C760
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00ECB6AE,?,?), ref: 00ECC9B5
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: _wcslen.LIBCMT ref: 00ECC9F1
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: _wcslen.LIBCMT ref: 00ECCA68
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: _wcslen.LIBCMT ref: 00ECCA9E
                                                                                                                                                                                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00ECBCCA
                                                                                                                                                                                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00ECBD25
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00ECBD6A
                                                                                                                                                                                                                                            • RegEnumValueW.ADVAPI32(?,-00000001,?,?,00000000,?,00000000,00000000), ref: 00ECBD99
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(?,?,00000000), ref: 00ECBDF3
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(?), ref: 00ECBDFF
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpperValue
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1120388591-0
                                                                                                                                                                                                                                            • Opcode ID: 5ad8a43d5a4b6e74ca0448dc39d0d41a1826792c7b6a2c21aaee8a7b828585cc
                                                                                                                                                                                                                                            • Instruction ID: 47eb1c94af0c87e90d23af818d55cfa9468ce928fb1f652e818b50b6ea9e1e11
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 5ad8a43d5a4b6e74ca0448dc39d0d41a1826792c7b6a2c21aaee8a7b828585cc
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9581A230108241AFC714DF24D585E2ABBE5FF84308F14595DF55AAB2A2CB32ED06CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • VariantInit.OLEAUT32(00000035), ref: 00E9F7B9
                                                                                                                                                                                                                                            • SysAllocString.OLEAUT32(00000001), ref: 00E9F860
                                                                                                                                                                                                                                            • VariantCopy.OLEAUT32(00E9FA64,00000000), ref: 00E9F889
                                                                                                                                                                                                                                            • VariantClear.OLEAUT32(00E9FA64), ref: 00E9F8AD
                                                                                                                                                                                                                                            • VariantCopy.OLEAUT32(00E9FA64,00000000), ref: 00E9F8B1
                                                                                                                                                                                                                                            • VariantClear.OLEAUT32(?), ref: 00E9F8BB
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Variant$ClearCopy$AllocInitString
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3859894641-0
                                                                                                                                                                                                                                            • Opcode ID: 62059b90202953d415ed9a807059ea7066202e0ccbcaa05ebc5c4b30746c2d52
                                                                                                                                                                                                                                            • Instruction ID: 450ec3434c5eb298e56546a3b199cca0c54bc77d5d0353a92994bf83758c2b8b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 62059b90202953d415ed9a807059ea7066202e0ccbcaa05ebc5c4b30746c2d52
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: EA51B531600310BACF24ABA5D895B69B3E9EF85324B24A467E905FF296DB70CC40C796
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E47620: _wcslen.LIBCMT ref: 00E47625
                                                                                                                                                                                                                                              • Part of subcall function 00E46B57: _wcslen.LIBCMT ref: 00E46B6A
                                                                                                                                                                                                                                            • GetOpenFileNameW.COMDLG32(00000058), ref: 00EB94E5
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EB9506
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EB952D
                                                                                                                                                                                                                                            • GetSaveFileNameW.COMDLG32(00000058), ref: 00EB9585
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen$FileName$OpenSave
                                                                                                                                                                                                                                            • String ID: X
                                                                                                                                                                                                                                            • API String ID: 83654149-3081909835
                                                                                                                                                                                                                                            • Opcode ID: a91fe675bbac640d12ca535232c367dab8715edbb41010c04ac9782b352e177b
                                                                                                                                                                                                                                            • Instruction ID: a8b149f197423e1622a18e378fd52fbbdf8282cc479f183d2801d30be547167d
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a91fe675bbac640d12ca535232c367dab8715edbb41010c04ac9782b352e177b
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 12E1B0319083008FD724DF24D881AABB7E5FF85314F14996DF999AB2A2DB31DD05CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E59BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E59BB2
                                                                                                                                                                                                                                            • BeginPaint.USER32(?,?,?), ref: 00E59241
                                                                                                                                                                                                                                            • GetWindowRect.USER32(?,?), ref: 00E592A5
                                                                                                                                                                                                                                            • ScreenToClient.USER32(?,?), ref: 00E592C2
                                                                                                                                                                                                                                            • SetViewportOrgEx.GDI32(00000000,?,?,00000000), ref: 00E592D3
                                                                                                                                                                                                                                            • EndPaint.USER32(?,?,?,?,?), ref: 00E59321
                                                                                                                                                                                                                                            • Rectangle.GDI32(00000000,00000000,00000000,?,?), ref: 00E971EA
                                                                                                                                                                                                                                              • Part of subcall function 00E59339: BeginPath.GDI32(00000000), ref: 00E59357
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: BeginPaintWindow$ClientLongPathRectRectangleScreenViewport
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3050599898-0
                                                                                                                                                                                                                                            • Opcode ID: 1d4294e9c280fa81eab6007ceb2fee3f67e1a92403cadfb7d4d0faf6bb3427b0
                                                                                                                                                                                                                                            • Instruction ID: 363ff46f6508d0a2aa9bcec269e5d88ed3cf95727aefe36ff468b5f91a2d2ae4
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 1d4294e9c280fa81eab6007ceb2fee3f67e1a92403cadfb7d4d0faf6bb3427b0
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B741AD30105201EFDB10DF25DC84FEA7BF8FB55765F140629FAA4A72A2C7309849EB61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • InterlockedExchange.KERNEL32(?,000001F5), ref: 00EB080C
                                                                                                                                                                                                                                            • ReadFile.KERNEL32(?,?,0000FFFF,?,00000000), ref: 00EB0847
                                                                                                                                                                                                                                            • EnterCriticalSection.KERNEL32(?), ref: 00EB0863
                                                                                                                                                                                                                                            • LeaveCriticalSection.KERNEL32(?), ref: 00EB08DC
                                                                                                                                                                                                                                            • ReadFile.KERNEL32(?,?,0000FFFF,00000000,00000000), ref: 00EB08F3
                                                                                                                                                                                                                                            • InterlockedExchange.KERNEL32(?,000001F6), ref: 00EB0921
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CriticalExchangeFileInterlockedReadSection$EnterLeave
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3368777196-0
                                                                                                                                                                                                                                            • Opcode ID: f925fbb3dc17cbaeaeb6845c23a028787ef6634cb16d980d112670e1b164d6bc
                                                                                                                                                                                                                                            • Instruction ID: 919511a540d3421a9d999c9b1631059f5ae623144fd60fbbfea01912a914a7d7
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f925fbb3dc17cbaeaeb6845c23a028787ef6634cb16d980d112670e1b164d6bc
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 35417A71900206EFDF14AF54DC85AAB77B8FF44310F1440A9ED04AA2A7DB30EE65DBA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • ShowWindow.USER32(FFFFFFFF,00000000,?,00000000,00000000,?,00E9F3AB,00000000,?,?,00000000,?,00E9682C,00000004,00000000,00000000), ref: 00ED824C
                                                                                                                                                                                                                                            • EnableWindow.USER32(?,00000000), ref: 00ED8272
                                                                                                                                                                                                                                            • ShowWindow.USER32(FFFFFFFF,00000000), ref: 00ED82D1
                                                                                                                                                                                                                                            • ShowWindow.USER32(?,00000004), ref: 00ED82E5
                                                                                                                                                                                                                                            • EnableWindow.USER32(?,00000001), ref: 00ED830B
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000130C,00000000,00000000), ref: 00ED832F
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$Show$Enable$MessageSend
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 642888154-0
                                                                                                                                                                                                                                            • Opcode ID: 5af9e2be6c5f94a45134bcf6d52339766a769359a7f7043a88eb9d773b467daf
                                                                                                                                                                                                                                            • Instruction ID: a6b0b1a890bb936de5b01c693d9173578348a4f21f391a5632a78022a34eab7e
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 5af9e2be6c5f94a45134bcf6d52339766a769359a7f7043a88eb9d773b467daf
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 1D41C634601644EFDB11CF25DE95BE47BF0FB06718F19626AE6586B3B2CB319846CB40
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • IsWindowVisible.USER32(?), ref: 00EA4C95
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000000E,00000000,00000000), ref: 00EA4CB2
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000000D,00000001,00000000), ref: 00EA4CEA
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EA4D08
                                                                                                                                                                                                                                            • CharUpperBuffW.USER32(00000000,00000000,?,?,?,?), ref: 00EA4D10
                                                                                                                                                                                                                                            • _wcsstr.LIBVCRUNTIME ref: 00EA4D1A
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$BuffCharUpperVisibleWindow_wcslen_wcsstr
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 72514467-0
                                                                                                                                                                                                                                            • Opcode ID: 0b73dc8c52af6fc4eb678a81d14fef68c3675ce84ce031f9c4efbe1f9c8a0924
                                                                                                                                                                                                                                            • Instruction ID: faf10d4f2e7820a5b406741725f825797ec148135719de54c3c35dec55a70770
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 0b73dc8c52af6fc4eb678a81d14fef68c3675ce84ce031f9c4efbe1f9c8a0924
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 262107B16052017BEB155B39AC0AE7B7BDCDF8A760F10502AF809EE1D1DEA1EC00C2A1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E43AA2: GetFullPathNameW.KERNEL32(?,00007FFF,?,00000000,?,?,00E43A97,?,?,00E42E7F,?,?,?,00000000), ref: 00E43AC2
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EB587B
                                                                                                                                                                                                                                            • CoInitialize.OLE32(00000000), ref: 00EB5995
                                                                                                                                                                                                                                            • CoCreateInstance.OLE32(00EDFCF8,00000000,00000001,00EDFB68,?), ref: 00EB59AE
                                                                                                                                                                                                                                            • CoUninitialize.OLE32 ref: 00EB59CC
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CreateFullInitializeInstanceNamePathUninitialize_wcslen
                                                                                                                                                                                                                                            • String ID: .lnk
                                                                                                                                                                                                                                            • API String ID: 3172280962-24824748
                                                                                                                                                                                                                                            • Opcode ID: cf30eff35cfb344b81d1ca51b5ddf31d0d981713cc1ccf01e2524fdede9dd7e8
                                                                                                                                                                                                                                            • Instruction ID: efc111af340f888dc017c464b0ad053b320e9fe2f8cf764c41d62032c8b0cebb
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: cf30eff35cfb344b81d1ca51b5ddf31d0d981713cc1ccf01e2524fdede9dd7e8
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 0ED16472A087019FC714DF24C480A6BBBE1EF89714F14985DF899AB361DB31EC45CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EA0FB4: GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00EA0FCA
                                                                                                                                                                                                                                              • Part of subcall function 00EA0FB4: GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00EA0FD6
                                                                                                                                                                                                                                              • Part of subcall function 00EA0FB4: GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00EA0FE5
                                                                                                                                                                                                                                              • Part of subcall function 00EA0FB4: HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00EA0FEC
                                                                                                                                                                                                                                              • Part of subcall function 00EA0FB4: GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00EA1002
                                                                                                                                                                                                                                            • GetLengthSid.ADVAPI32(?,00000000,00EA1335), ref: 00EA17AE
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000008,00000000), ref: 00EA17BA
                                                                                                                                                                                                                                            • HeapAlloc.KERNEL32(00000000), ref: 00EA17C1
                                                                                                                                                                                                                                            • CopySid.ADVAPI32(00000000,00000000,?), ref: 00EA17DA
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000000,00000000,00EA1335), ref: 00EA17EE
                                                                                                                                                                                                                                            • HeapFree.KERNEL32(00000000), ref: 00EA17F5
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Heap$Process$AllocInformationToken$CopyErrorFreeLastLength
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3008561057-0
                                                                                                                                                                                                                                            • Opcode ID: 45b086bf88dcee8625e626b7714ca2d0df3268a492d03d8667c4b993e6b22f59
                                                                                                                                                                                                                                            • Instruction ID: a730db22cb49a51665b7ba171a6345e474ba00baf55a3c1d29c21ab1d3978dc5
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 45b086bf88dcee8625e626b7714ca2d0df3268a492d03d8667c4b993e6b22f59
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9611E131506206FFDB108FA4DC48FAE7BB8EB4B359F20605AF441BB150C731A944CB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetCurrentProcess.KERNEL32(0000000A,00000004), ref: 00EA14FF
                                                                                                                                                                                                                                            • OpenProcessToken.ADVAPI32(00000000), ref: 00EA1506
                                                                                                                                                                                                                                            • CreateEnvironmentBlock.USERENV(?,00000004,00000001), ref: 00EA1515
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000004), ref: 00EA1520
                                                                                                                                                                                                                                            • CreateProcessWithLogonW.ADVAPI32(?,?,?,00000000,00000000,?,?,00000000,?,?,?), ref: 00EA154F
                                                                                                                                                                                                                                            • DestroyEnvironmentBlock.USERENV(00000000), ref: 00EA1563
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Process$BlockCreateEnvironment$CloseCurrentDestroyHandleLogonOpenTokenWith
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1413079979-0
                                                                                                                                                                                                                                            • Opcode ID: d281599537196fea392ca71bbfa90361465db7c896bcb64a770b1d4a394fb1f9
                                                                                                                                                                                                                                            • Instruction ID: 620e614c07e9cd8a24927c0a678fab361a2a417e3a727b7359f4ee3fe8221be6
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: d281599537196fea392ca71bbfa90361465db7c896bcb64a770b1d4a394fb1f9
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 1D11897250120AAFDF118FA8ED09BDE3BA9EF49748F144056FA05B60A0C371DE64DB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(?,?,00E63379,00E62FE5), ref: 00E63390
                                                                                                                                                                                                                                            • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 00E6339E
                                                                                                                                                                                                                                            • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 00E633B7
                                                                                                                                                                                                                                            • SetLastError.KERNEL32(00000000,?,00E63379,00E62FE5), ref: 00E63409
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorLastValue___vcrt_
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3852720340-0
                                                                                                                                                                                                                                            • Opcode ID: 0354e635a859c587f050436e37bae140d1fceb94fb061d8e5a9c7e17787b104f
                                                                                                                                                                                                                                            • Instruction ID: e02629d24045e691c59801bcf201368607c2b4cbedd1fa2aec1a85c3f1efa03f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 0354e635a859c587f050436e37bae140d1fceb94fb061d8e5a9c7e17787b104f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7E01D4326C9312BEEA252775BC8556B2E94EB157F9720232AF520F12F0EF114E16A584
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(?,?,00E75686,00E83CD6,?,00000000,?,00E75B6A,?,?,?,?,?,00E6E6D1,?,00F08A48), ref: 00E72D78
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72DAB
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72DD3
                                                                                                                                                                                                                                            • SetLastError.KERNEL32(00000000,?,?,?,?,00E6E6D1,?,00F08A48,00000010,00E44F4A,?,?,00000000,00E83CD6), ref: 00E72DE0
                                                                                                                                                                                                                                            • SetLastError.KERNEL32(00000000,?,?,?,?,00E6E6D1,?,00F08A48,00000010,00E44F4A,?,?,00000000,00E83CD6), ref: 00E72DEC
                                                                                                                                                                                                                                            • _abort.LIBCMT ref: 00E72DF2
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorLast$_free$_abort
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3160817290-0
                                                                                                                                                                                                                                            • Opcode ID: f7181263f99e540ff894a2916e5ab595f415bfd8fabf5f882873d365c12afd83
                                                                                                                                                                                                                                            • Instruction ID: f4f44b87e7a7f2cad65053029bfcf22b073f2c3f642cc767a77613655dc20213
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f7181263f99e540ff894a2916e5ab595f415bfd8fabf5f882873d365c12afd83
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: F1F028319056013BC6322339BC06E5A26A9AFC17A4F34E11DFB2CB21E6EF2088825260
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E59639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E59693
                                                                                                                                                                                                                                              • Part of subcall function 00E59639: SelectObject.GDI32(?,00000000), ref: 00E596A2
                                                                                                                                                                                                                                              • Part of subcall function 00E59639: BeginPath.GDI32(?), ref: 00E596B9
                                                                                                                                                                                                                                              • Part of subcall function 00E59639: SelectObject.GDI32(?,00000000), ref: 00E596E2
                                                                                                                                                                                                                                            • MoveToEx.GDI32(?,-00000002,00000000,00000000), ref: 00ED8A4E
                                                                                                                                                                                                                                            • LineTo.GDI32(?,00000003,00000000), ref: 00ED8A62
                                                                                                                                                                                                                                            • MoveToEx.GDI32(?,00000000,-00000002,00000000), ref: 00ED8A70
                                                                                                                                                                                                                                            • LineTo.GDI32(?,00000000,00000003), ref: 00ED8A80
                                                                                                                                                                                                                                            • EndPath.GDI32(?), ref: 00ED8A90
                                                                                                                                                                                                                                            • StrokePath.GDI32(?), ref: 00ED8AA0
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Path$LineMoveObjectSelect$BeginCreateStroke
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 43455801-0
                                                                                                                                                                                                                                            • Opcode ID: 92811e0ce3a2b15a05f74afbbe62621b5e33b1af4d5697fa722a79b229afbf88
                                                                                                                                                                                                                                            • Instruction ID: 3d8d872bbe340496467df8325d04dcae833a2bf500abad9110ff38416d0d15c4
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 92811e0ce3a2b15a05f74afbbe62621b5e33b1af4d5697fa722a79b229afbf88
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9511097600114DFFDF129F91EC88EEA7F6CEB08394F108012BA19AA1A1C7719D59DBA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetDC.USER32(00000000), ref: 00EA5218
                                                                                                                                                                                                                                            • GetDeviceCaps.GDI32(00000000,00000058), ref: 00EA5229
                                                                                                                                                                                                                                            • GetDeviceCaps.GDI32(00000000,0000005A), ref: 00EA5230
                                                                                                                                                                                                                                            • ReleaseDC.USER32(00000000,00000000), ref: 00EA5238
                                                                                                                                                                                                                                            • MulDiv.KERNEL32(000009EC,?,00000000), ref: 00EA524F
                                                                                                                                                                                                                                            • MulDiv.KERNEL32(000009EC,00000001,?), ref: 00EA5261
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CapsDevice$Release
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1035833867-0
                                                                                                                                                                                                                                            • Opcode ID: 7e6cacf4d2f4e7872cb65bbdbaceb291baddaf895ab6bb396414af7fcd189048
                                                                                                                                                                                                                                            • Instruction ID: 5ee6e5e43251f6c8ee21dd1dbc540f1468e018313bd64d945987c263a9ebe22b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 7e6cacf4d2f4e7872cb65bbdbaceb291baddaf895ab6bb396414af7fcd189048
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 49018F75A01719BFEB109BA69C49B4EBFB8EF48751F144066FA04BB290D6709804CBA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • MapVirtualKeyW.USER32(0000005B,00000000), ref: 00E41BF4
                                                                                                                                                                                                                                            • MapVirtualKeyW.USER32(00000010,00000000), ref: 00E41BFC
                                                                                                                                                                                                                                            • MapVirtualKeyW.USER32(000000A0,00000000), ref: 00E41C07
                                                                                                                                                                                                                                            • MapVirtualKeyW.USER32(000000A1,00000000), ref: 00E41C12
                                                                                                                                                                                                                                            • MapVirtualKeyW.USER32(00000011,00000000), ref: 00E41C1A
                                                                                                                                                                                                                                            • MapVirtualKeyW.USER32(00000012,00000000), ref: 00E41C22
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Virtual
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 4278518827-0
                                                                                                                                                                                                                                            • Opcode ID: f2c31b82b125c18e0bd3086d108db1b0c7c5801e9966e094baafa347a8979dcb
                                                                                                                                                                                                                                            • Instruction ID: 2e5cb0a1c8bee41dca7816845741dd2ec213c222263cda0caf1d0ddbc3b1d28e
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f2c31b82b125c18e0bd3086d108db1b0c7c5801e9966e094baafa347a8979dcb
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 46016CB090275A7DE3008F5A8C85B52FFA8FF19754F00411B915C47941C7F5A864CBE5
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • PostMessageW.USER32(?,00000010,00000000,00000000), ref: 00EAEB30
                                                                                                                                                                                                                                            • SendMessageTimeoutW.USER32(?,00000010,00000000,00000000,00000002,000001F4,?), ref: 00EAEB46
                                                                                                                                                                                                                                            • GetWindowThreadProcessId.USER32(?,?), ref: 00EAEB55
                                                                                                                                                                                                                                            • OpenProcess.KERNEL32(001F0FFF,00000000,?,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00EAEB64
                                                                                                                                                                                                                                            • TerminateProcess.KERNEL32(00000000,00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00EAEB6E
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,00000010,00000000,00000000,00000002,000001F4,?,?,00000010,00000000,00000000), ref: 00EAEB75
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Process$Message$CloseHandleOpenPostSendTerminateThreadTimeoutWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 839392675-0
                                                                                                                                                                                                                                            • Opcode ID: e4268b1669d5fc7ef357529e9ed540a846981f4a7a119c641700315fedf604ac
                                                                                                                                                                                                                                            • Instruction ID: 150cd661603dbfd7cf676f9841ff766ae6dbcb98c4eb4d3ad65efa942c1276ed
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: e4268b1669d5fc7ef357529e9ed540a846981f4a7a119c641700315fedf604ac
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: CFF06D72142129BFEA205B53AC0DEAF3B7CEBCAF51F10015AF611E109097A05A05C6B5
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetClientRect.USER32(?), ref: 00E97452
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001328,00000000,?), ref: 00E97469
                                                                                                                                                                                                                                            • GetWindowDC.USER32(?), ref: 00E97475
                                                                                                                                                                                                                                            • GetPixel.GDI32(00000000,?,?), ref: 00E97484
                                                                                                                                                                                                                                            • ReleaseDC.USER32(?,00000000), ref: 00E97496
                                                                                                                                                                                                                                            • GetSysColor.USER32(00000005), ref: 00E974B0
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ClientColorMessagePixelRectReleaseSendWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 272304278-0
                                                                                                                                                                                                                                            • Opcode ID: f2e48a5e8a203443d3c33271ce0f9735b5c93dfd994dafb16a654df9d47eecf3
                                                                                                                                                                                                                                            • Instruction ID: 6b1abf6515557d62da2d50c6614d7234559e2bc744a6dd33fd0f560afca48da2
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f2e48a5e8a203443d3c33271ce0f9735b5c93dfd994dafb16a654df9d47eecf3
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: EC018B31405216EFDB105FA5EC08BEE7BB6FB04751F210161F925B21A1CB311E49EB51
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • WaitForSingleObject.KERNEL32(?,000000FF), ref: 00EA187F
                                                                                                                                                                                                                                            • UnloadUserProfile.USERENV(?,?), ref: 00EA188B
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00EA1894
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00EA189C
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000000,?), ref: 00EA18A5
                                                                                                                                                                                                                                            • HeapFree.KERNEL32(00000000), ref: 00EA18AC
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CloseHandleHeap$FreeObjectProcessProfileSingleUnloadUserWait
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 146765662-0
                                                                                                                                                                                                                                            • Opcode ID: 715406c03e5c085824a071c9258aaedfa3a43c1dddc250e49885c144f7f14695
                                                                                                                                                                                                                                            • Instruction ID: d614da822dc974fa651dc61df538268893f676eacd53a44d8fa61df08f34cb84
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 715406c03e5c085824a071c9258aaedfa3a43c1dddc250e49885c144f7f14695
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4BE0ED36046112FFDB016FA2FD0C905BF39FF497627208222F225A10B1CB325464DF50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E60242: EnterCriticalSection.KERNEL32(00F1070C,00F11884,?,?,00E5198B,00F12518,?,?,?,00E412F9,00000000), ref: 00E6024D
                                                                                                                                                                                                                                              • Part of subcall function 00E60242: LeaveCriticalSection.KERNEL32(00F1070C,?,00E5198B,00F12518,?,?,?,00E412F9,00000000), ref: 00E6028A
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                              • Part of subcall function 00E600A3: __onexit.LIBCMT ref: 00E600A9
                                                                                                                                                                                                                                            • __Init_thread_footer.LIBCMT ref: 00EC7BFB
                                                                                                                                                                                                                                              • Part of subcall function 00E601F8: EnterCriticalSection.KERNEL32(00F1070C,?,?,00E58747,00F12514), ref: 00E60202
                                                                                                                                                                                                                                              • Part of subcall function 00E601F8: LeaveCriticalSection.KERNEL32(00F1070C,?,00E58747,00F12514), ref: 00E60235
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CriticalSection$EnterLeave$Init_thread_footer__onexit_wcslen
                                                                                                                                                                                                                                            • String ID: +T$5$G$Variable must be of type 'Object'.
                                                                                                                                                                                                                                            • API String ID: 535116098-4125810065
                                                                                                                                                                                                                                            • Opcode ID: 14645f8bb524c3690069c70e6fb3d827ee059f11d4ef830ac99c2613ef12b7bc
                                                                                                                                                                                                                                            • Instruction ID: 10eb7524a06a5a67d28265376f074236a43182abe8de1e3c9cfc2b4e1cdba1f7
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 14645f8bb524c3690069c70e6fb3d827ee059f11d4ef830ac99c2613ef12b7bc
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2F916C70A04209AFCB14EF54DA91EADBBB1AF49304F14905DF8467B292DB32AE42DB51
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E47620: _wcslen.LIBCMT ref: 00E47625
                                                                                                                                                                                                                                            • GetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00EAC6EE
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EAC735
                                                                                                                                                                                                                                            • SetMenuItemInfoW.USER32(?,?,00000000,?), ref: 00EAC79C
                                                                                                                                                                                                                                            • SetMenuDefaultItem.USER32(?,000000FF,00000000), ref: 00EAC7CA
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ItemMenu$Info_wcslen$Default
                                                                                                                                                                                                                                            • String ID: 0
                                                                                                                                                                                                                                            • API String ID: 1227352736-4108050209
                                                                                                                                                                                                                                            • Opcode ID: ebbbfc7e8af941bb45585bd3c1cf0e9c742d942794df9a17a128b3b3b99320d0
                                                                                                                                                                                                                                            • Instruction ID: cbc50b5b6453b23a3a1e6e7a0336678204d605d018395e37335225295087895a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ebbbfc7e8af941bb45585bd3c1cf0e9c742d942794df9a17a128b3b3b99320d0
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2351F1716043019BD715DF38C845BAB77E4AF8E318F242A2AF991FB190DB60E844CF92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • ShellExecuteExW.SHELL32(0000003C), ref: 00ECAEA3
                                                                                                                                                                                                                                              • Part of subcall function 00E47620: _wcslen.LIBCMT ref: 00E47625
                                                                                                                                                                                                                                            • GetProcessId.KERNEL32(00000000), ref: 00ECAF38
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00ECAF67
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CloseExecuteHandleProcessShell_wcslen
                                                                                                                                                                                                                                            • String ID: <$@
                                                                                                                                                                                                                                            • API String ID: 146682121-1426351568
                                                                                                                                                                                                                                            • Opcode ID: f4d990de4cb5c889cb0b02d9fe75d04fdd047ec7dcb5efe6f868fc15c2811c1e
                                                                                                                                                                                                                                            • Instruction ID: be7966c8a278d4893d5704f8a0107b02a26ef6b9975dee78fced07550e577778
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f4d990de4cb5c889cb0b02d9fe75d04fdd047ec7dcb5efe6f868fc15c2811c1e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7F715470A002199FCB14DF54D584A9EBBF1EF08318F0894ADE856BB352CB35ED46CB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CoCreateInstance.OLE32(?,00000000,00000005,?,?,?,?,?,?,?,?,?,?,?), ref: 00EA7206
                                                                                                                                                                                                                                            • SetErrorMode.KERNEL32(00000001,?,?,?,?,?,?,?,?,?), ref: 00EA723C
                                                                                                                                                                                                                                            • GetProcAddress.KERNEL32(?,DllGetClassObject), ref: 00EA724D
                                                                                                                                                                                                                                            • SetErrorMode.KERNEL32(00000000,?,?,?,?,?,?,?,?,?), ref: 00EA72CF
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorMode$AddressCreateInstanceProc
                                                                                                                                                                                                                                            • String ID: DllGetClassObject
                                                                                                                                                                                                                                            • API String ID: 753597075-1075368562
                                                                                                                                                                                                                                            • Opcode ID: 4f028085f7fdb0b7a35351b5efafca64da0cf17e9a8bda4de1e5ac6f21c51942
                                                                                                                                                                                                                                            • Instruction ID: 977ad8cc838fc0e221e033bbc923bb2a4ae59e945a5346e7ca7e94f7752afa8f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 4f028085f7fdb0b7a35351b5efafca64da0cf17e9a8bda4de1e5ac6f21c51942
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D5418EB1604204AFDB15CF54CC84B9A7BB9EF49314F2490AABD45EF21AD7B0E945CBA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetMenuItemInfoW.USER32(?,000000FF,00000000,00000030), ref: 00ED3E35
                                                                                                                                                                                                                                            • IsMenu.USER32(?), ref: 00ED3E4A
                                                                                                                                                                                                                                            • InsertMenuItemW.USER32(?,?,00000001,00000030), ref: 00ED3E92
                                                                                                                                                                                                                                            • DrawMenuBar.USER32 ref: 00ED3EA5
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Menu$Item$DrawInfoInsert
                                                                                                                                                                                                                                            • String ID: 0
                                                                                                                                                                                                                                            • API String ID: 3076010158-4108050209
                                                                                                                                                                                                                                            • Opcode ID: 89dd0c6610d5b7896fd7e017023fb927689fe4c993ba2fe0caa38c8993cb43ed
                                                                                                                                                                                                                                            • Instruction ID: fc1d7419be2efa0cd654330377cb68e221dd8fd4654fc2a707edc2fd3b4fff32
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 89dd0c6610d5b7896fd7e017023fb927689fe4c993ba2fe0caa38c8993cb43ed
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2A416875A01309AFDB10DF60E884AEABBB9FF48354F04512AED05A7390D730AE46CF51
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                              • Part of subcall function 00EA3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00EA3CCA
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000188,00000000,00000000), ref: 00EA1E66
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000018A,00000000,00000000), ref: 00EA1E79
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000189,?,00000000), ref: 00EA1EA9
                                                                                                                                                                                                                                              • Part of subcall function 00E46B57: _wcslen.LIBCMT ref: 00E46B6A
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$_wcslen$ClassName
                                                                                                                                                                                                                                            • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                            • API String ID: 2081771294-1403004172
                                                                                                                                                                                                                                            • Opcode ID: d0adc29afe2c75e702762ceeaa8e9a5125e7489b8eb002ac2d5d123c47d90968
                                                                                                                                                                                                                                            • Instruction ID: dacf1ac69f920cf170e19436c7e464cbcfd6e8a580e21d2cb6399e3df644d4cc
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: d0adc29afe2c75e702762ceeaa8e9a5125e7489b8eb002ac2d5d123c47d90968
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 24212771A00104BEDB14AB64EC46CFFBBF9DF4A3A4F10A119F825BB1E1DB346909D621
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen
                                                                                                                                                                                                                                            • String ID: HKEY_LOCAL_MACHINE$HKLM
                                                                                                                                                                                                                                            • API String ID: 176396367-4004644295
                                                                                                                                                                                                                                            • Opcode ID: 67df58650428ff65378e999df8095ba634c22de45a42510152ed6121c00981be
                                                                                                                                                                                                                                            • Instruction ID: da72670da219dcfd00e0bc09db94905488c909a6584d5fc174a524776522748f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 67df58650428ff65378e999df8095ba634c22de45a42510152ed6121c00981be
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D9314D73A4016E4BCB20EF2C9A44ABF33915BA1748F25601DE85F7B285E673CD42D3A0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000467,00000000,?), ref: 00ED2F8D
                                                                                                                                                                                                                                            • LoadLibraryW.KERNEL32(?), ref: 00ED2F94
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000467,00000000,00000000), ref: 00ED2FA9
                                                                                                                                                                                                                                            • DestroyWindow.USER32(?), ref: 00ED2FB1
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$DestroyLibraryLoadWindow
                                                                                                                                                                                                                                            • String ID: SysAnimate32
                                                                                                                                                                                                                                            • API String ID: 3529120543-1011021900
                                                                                                                                                                                                                                            • Opcode ID: 9349e014e0ce185d58f7e3685ac2ab1c88fca2f51a8ecaf3a2c6cf7fda0ecd43
                                                                                                                                                                                                                                            • Instruction ID: b71acb02d47604ac5bd48fb0be1ee07bfae6c61e0688dfc2a78c68a40d7f74ba
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9349e014e0ce185d58f7e3685ac2ab1c88fca2f51a8ecaf3a2c6cf7fda0ecd43
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2C219F71204205AFEB104F64DC80EBB37B9EB69368F106A1EFA50F2290D772DC52A760
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,?,?,?,00E64D1E,00E728E9,(,00E64CBE,00000000,00F088B8,0000000C,00E64E15,(,00000002), ref: 00E64D8D
                                                                                                                                                                                                                                            • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 00E64DA0
                                                                                                                                                                                                                                            • FreeLibrary.KERNEL32(00000000,?,?,?,00E64D1E,00E728E9,(,00E64CBE,00000000,00F088B8,0000000C,00E64E15,(,00000002,00000000), ref: 00E64DC3
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: AddressFreeHandleLibraryModuleProc
                                                                                                                                                                                                                                            • String ID: CorExitProcess$mscoree.dll
                                                                                                                                                                                                                                            • API String ID: 4061214504-1276376045
                                                                                                                                                                                                                                            • Opcode ID: 961263a0705ac434497514321bf30bba9a01d767c6c041685291de66b7b8a5d8
                                                                                                                                                                                                                                            • Instruction ID: c7322128ec536831a87c3b8e78fd65c9853a6815767fe1da06cd6706fb20e3f2
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 961263a0705ac434497514321bf30bba9a01d767c6c041685291de66b7b8a5d8
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: A7F0AF74A41219BFDB109F91EC09BAEBBB8EF44795F1001A5F805B22A0CF705984DA91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00E44EDD,?,00F11418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E44E9C
                                                                                                                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Wow64DisableWow64FsRedirection), ref: 00E44EAE
                                                                                                                                                                                                                                            • FreeLibrary.KERNEL32(00000000,?,?,00E44EDD,?,00F11418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E44EC0
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                            • String ID: Wow64DisableWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                            • API String ID: 145871493-3689287502
                                                                                                                                                                                                                                            • Opcode ID: 0d49e1595c5238e619a4dec6f29f2cc96fdf1d5d982c0dea5d696a144cfc7cf5
                                                                                                                                                                                                                                            • Instruction ID: a5b8a858ae6d76e5c5b7353a520cca2b82410db50d34fdd949574660c2285df4
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 0d49e1595c5238e619a4dec6f29f2cc96fdf1d5d982c0dea5d696a144cfc7cf5
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: BFE08635B036339FD22117267C1CB6F6668EF81BA67151117FC00F6290DF60CD06C0A2
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • LoadLibraryA.KERNEL32(kernel32.dll,?,?,00E83CDE,?,00F11418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E44E62
                                                                                                                                                                                                                                            • GetProcAddress.KERNEL32(00000000,Wow64RevertWow64FsRedirection), ref: 00E44E74
                                                                                                                                                                                                                                            • FreeLibrary.KERNEL32(00000000,?,?,00E83CDE,?,00F11418,00000001,>>>AUTOIT NO CMDEXECUTE<<<,?,?,?,00000000), ref: 00E44E87
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Library$AddressFreeLoadProc
                                                                                                                                                                                                                                            • String ID: Wow64RevertWow64FsRedirection$kernel32.dll
                                                                                                                                                                                                                                            • API String ID: 145871493-1355242751
                                                                                                                                                                                                                                            • Opcode ID: 685e76d49d0c0599f32aa529235d4e99c93b12f77d4b7a7161479d0591f630fd
                                                                                                                                                                                                                                            • Instruction ID: cf264d2b584d901d701e47c044a955c78ba24434dc9bca83246cba6c233affbc
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 685e76d49d0c0599f32aa529235d4e99c93b12f77d4b7a7161479d0591f630fd
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: BED0C231A036335B8B221B267C08E8F6B2CEF81B953151613B800F7194CF20CD02C1D1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00EB2C05
                                                                                                                                                                                                                                            • DeleteFileW.KERNEL32(?), ref: 00EB2C87
                                                                                                                                                                                                                                            • CopyFileW.KERNEL32(?,?,00000000,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001), ref: 00EB2C9D
                                                                                                                                                                                                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00EB2CAE
                                                                                                                                                                                                                                            • DeleteFileW.KERNEL32(?,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004,00000001,?,?,00000004), ref: 00EB2CC0
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: File$Delete$Copy
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3226157194-0
                                                                                                                                                                                                                                            • Opcode ID: 9d87398a57916e2af890cfcc43cc271717bd5d886e425c1a8d42abb2bd5abce6
                                                                                                                                                                                                                                            • Instruction ID: 74df4bf540242c12a642b7919f6b0f7ff8dd6a1e75fc6ea64051c57a71125987
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9d87398a57916e2af890cfcc43cc271717bd5d886e425c1a8d42abb2bd5abce6
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 0FB13A72A01119ABDF21DFA4DC85EDFBBBDEF48350F1050AAF609F6151EA309A448F61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetCurrentProcessId.KERNEL32 ref: 00ECA427
                                                                                                                                                                                                                                            • OpenProcess.KERNEL32(00000410,00000000,00000000), ref: 00ECA435
                                                                                                                                                                                                                                            • GetProcessIoCounters.KERNEL32(00000000,?), ref: 00ECA468
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?), ref: 00ECA63D
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Process$CloseCountersCurrentHandleOpen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3488606520-0
                                                                                                                                                                                                                                            • Opcode ID: 1e6fc5d244821b5e4c7c3faf44417a140b9f242c209cff43032801192a9e3561
                                                                                                                                                                                                                                            • Instruction ID: e81242b043f1189b3a933e80154d22d4634f8b5ed72fe5fa2b9d69a330efe4b1
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 1e6fc5d244821b5e4c7c3faf44417a140b9f242c209cff43032801192a9e3561
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 8DA1C1716043009FD720DF24D986F2AB7E1AF84718F18985DF95AAB392D771EC05CB82
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EADDE0: GetFullPathNameW.KERNEL32(00000000,00007FFF,?,?,?,?,?,?,00EACF22,?), ref: 00EADDFD
                                                                                                                                                                                                                                              • Part of subcall function 00EADDE0: GetFullPathNameW.KERNEL32(?,00007FFF,?,?,?,?,?,00EACF22,?), ref: 00EADE16
                                                                                                                                                                                                                                              • Part of subcall function 00EAE199: GetFileAttributesW.KERNEL32(?,00EACF95), ref: 00EAE19A
                                                                                                                                                                                                                                            • lstrcmpiW.KERNEL32(?,?), ref: 00EAE473
                                                                                                                                                                                                                                            • MoveFileW.KERNEL32(?,?), ref: 00EAE4AC
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EAE5EB
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EAE603
                                                                                                                                                                                                                                            • SHFileOperationW.SHELL32(?,?,?,?,?,?), ref: 00EAE650
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: File$FullNamePath_wcslen$AttributesMoveOperationlstrcmpi
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3183298772-0
                                                                                                                                                                                                                                            • Opcode ID: 4fffc37df1ad8ea38d65ad114a0e2a98afd416b9b4214b492b98ae7630fc1d26
                                                                                                                                                                                                                                            • Instruction ID: c9b7f0c46393860761603c79110719b1bb92513c94719fdaa37aa6efa8532d7b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 4fffc37df1ad8ea38d65ad114a0e2a98afd416b9b4214b492b98ae7630fc1d26
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C25193B24083459BC724DB94EC819DBB3ECAF99344F10191EF589E7192EF34B5888766
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: CharUpperBuffW.USER32(?,?,?,?,?,?,?,00ECB6AE,?,?), ref: 00ECC9B5
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: _wcslen.LIBCMT ref: 00ECC9F1
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: _wcslen.LIBCMT ref: 00ECCA68
                                                                                                                                                                                                                                              • Part of subcall function 00ECC998: _wcslen.LIBCMT ref: 00ECCA9E
                                                                                                                                                                                                                                            • RegConnectRegistryW.ADVAPI32(?,?,?), ref: 00ECBAA5
                                                                                                                                                                                                                                            • RegOpenKeyExW.ADVAPI32(?,?,00000000,?,?), ref: 00ECBB00
                                                                                                                                                                                                                                            • RegEnumKeyExW.ADVAPI32(?,-00000001,?,?,00000000,00000000,00000000,?), ref: 00ECBB63
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(?,?), ref: 00ECBBA6
                                                                                                                                                                                                                                            • RegCloseKey.ADVAPI32(00000000), ref: 00ECBBB3
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen$Close$BuffCharConnectEnumOpenRegistryUpper
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 826366716-0
                                                                                                                                                                                                                                            • Opcode ID: ed70b07f19392b05eaaf879fc978ddf3c07f8d656895a689dab2052be7e3e45d
                                                                                                                                                                                                                                            • Instruction ID: f7a88e900281ebca27ea71c7c6157301807f4f352db61dad3aea93e297cadce8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ed70b07f19392b05eaaf879fc978ddf3c07f8d656895a689dab2052be7e3e45d
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D461B131208241AFC314DF14C591F2ABBE5FF84308F14955DF499AB2A2CB32ED46CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • VariantInit.OLEAUT32(?), ref: 00EA8BCD
                                                                                                                                                                                                                                            • VariantClear.OLEAUT32 ref: 00EA8C3E
                                                                                                                                                                                                                                            • VariantClear.OLEAUT32 ref: 00EA8C9D
                                                                                                                                                                                                                                            • VariantClear.OLEAUT32(?), ref: 00EA8D10
                                                                                                                                                                                                                                            • VariantChangeType.OLEAUT32(?,?,00000000,00000013), ref: 00EA8D3B
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Variant$Clear$ChangeInitType
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 4136290138-0
                                                                                                                                                                                                                                            • Opcode ID: b5d9c4d64393562bfe1e18aeb4b37633a2d4b5d9a6cd036990f6e7be2eaad840
                                                                                                                                                                                                                                            • Instruction ID: 13939e7ca9ba1c99436b7c5c30617b2c4f2268f0300e26e00f23936bae498ed8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b5d9c4d64393562bfe1e18aeb4b37633a2d4b5d9a6cd036990f6e7be2eaad840
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 0A5169B5A0021AEFCB14CF68D894AAAB7F8FF8D314B158559E915EB350E730E911CF90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetPrivateProfileSectionW.KERNEL32(00000003,?,00007FFF,?), ref: 00EB8BAE
                                                                                                                                                                                                                                            • GetPrivateProfileSectionW.KERNEL32(?,00000003,00000003,?), ref: 00EB8BDA
                                                                                                                                                                                                                                            • WritePrivateProfileSectionW.KERNEL32(?,?,?), ref: 00EB8C32
                                                                                                                                                                                                                                            • WritePrivateProfileStringW.KERNEL32(00000003,00000000,00000000,?), ref: 00EB8C57
                                                                                                                                                                                                                                            • WritePrivateProfileStringW.KERNEL32(00000000,00000000,00000000,?), ref: 00EB8C5F
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: PrivateProfile$SectionWrite$String
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2832842796-0
                                                                                                                                                                                                                                            • Opcode ID: 22687b5c453527a89b0b1ace51b080aa315fa603f44a43005d1e564285f31243
                                                                                                                                                                                                                                            • Instruction ID: 9b077bf75f593496199fbb27c5c5b8fe5cc4b25e052cb51899ce243178fe6e66
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 22687b5c453527a89b0b1ace51b080aa315fa603f44a43005d1e564285f31243
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: F0516835A00215AFCB00DF64D881AAEBBF5FF48314F089459E849AB362CB35ED41CF91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • LoadLibraryW.KERNEL32(?,00000000,?), ref: 00EC8F40
                                                                                                                                                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00EC8FD0
                                                                                                                                                                                                                                            • GetProcAddress.KERNEL32(00000000,00000000), ref: 00EC8FEC
                                                                                                                                                                                                                                            • GetProcAddress.KERNEL32(00000000,?), ref: 00EC9032
                                                                                                                                                                                                                                            • FreeLibrary.KERNEL32(00000000), ref: 00EC9052
                                                                                                                                                                                                                                              • Part of subcall function 00E5F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,00000000,?,?,?,00EB1043,?,753CE610), ref: 00E5F6E6
                                                                                                                                                                                                                                              • Part of subcall function 00E5F6C9: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00E9FA64,00000000,00000000,?,?,00EB1043,?,753CE610,?,00E9FA64), ref: 00E5F70D
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: AddressProc$ByteCharLibraryMultiWide$FreeLoad
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 666041331-0
                                                                                                                                                                                                                                            • Opcode ID: a9437bddb9d00975fa404fa061da138d040e1843e1dc5349fd015219b69662b7
                                                                                                                                                                                                                                            • Instruction ID: aa355bd4e8cb84cb994bc38e46ae54be88ef8ad67cdfa28c280b8574e26525e6
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a9437bddb9d00975fa404fa061da138d040e1843e1dc5349fd015219b69662b7
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 3C514934601245DFC715DF58C685DADBBF1FF49314B0490A9E80AAB362DB32ED86CB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SetWindowLongW.USER32(00000002,000000F0,?), ref: 00ED6C33
                                                                                                                                                                                                                                            • SetWindowLongW.USER32(?,000000EC,?), ref: 00ED6C4A
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000002,00001036,00000000,?), ref: 00ED6C73
                                                                                                                                                                                                                                            • ShowWindow.USER32(00000002,00000000,00000002,00000002,?,?,?,?,?,?,?,00EBAB79,00000000,00000000), ref: 00ED6C98
                                                                                                                                                                                                                                            • SetWindowPos.USER32(?,00000000,00000000,00000000,00000000,00000000,00000027,00000002,?,00000001,00000002,00000002,?,?,?), ref: 00ED6CC7
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$Long$MessageSendShow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3688381893-0
                                                                                                                                                                                                                                            • Opcode ID: cd24e5426c96d44d4a7f8b964efee2fc7fa0d45c1b4c2f3f8fb3eb07190b31d9
                                                                                                                                                                                                                                            • Instruction ID: 799f39137f5f52045aecca97fab1c80b62ce69a3fc543ed0ffc5c003a9d17f9f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: cd24e5426c96d44d4a7f8b964efee2fc7fa0d45c1b4c2f3f8fb3eb07190b31d9
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 5E41F235A10104AFDB24CF28CD58FE9BBA5EB09364F15122AF999B73E0C371ED42DA40
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _free
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 269201875-0
                                                                                                                                                                                                                                            • Opcode ID: 64f8b19f632615cf1a276ba881ab003d14d69f53de49c0016f29dd456f6d3117
                                                                                                                                                                                                                                            • Instruction ID: cd7e69a10f852b5aab075beab2ad2d339550c3e0b27d0774d95a3b93812abff3
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 64f8b19f632615cf1a276ba881ab003d14d69f53de49c0016f29dd456f6d3117
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2141D032A002049FCB24DF78C881A5AB3E5EF89714F1595ACEA19FB391DA31AD01CB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetCursorPos.USER32(?), ref: 00E59141
                                                                                                                                                                                                                                            • ScreenToClient.USER32(00000000,?), ref: 00E5915E
                                                                                                                                                                                                                                            • GetAsyncKeyState.USER32(00000001), ref: 00E59183
                                                                                                                                                                                                                                            • GetAsyncKeyState.USER32(00000002), ref: 00E5919D
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: AsyncState$ClientCursorScreen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 4210589936-0
                                                                                                                                                                                                                                            • Opcode ID: 76d069d338b80cf55d25338acacce8cfde2718ba0fec15de47143e74676e0f7a
                                                                                                                                                                                                                                            • Instruction ID: baf4d275da3b464599714efb5dfd114e718788abab21433b877a6f279035e678
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 76d069d338b80cf55d25338acacce8cfde2718ba0fec15de47143e74676e0f7a
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 6C41AE31A0961AEBCF059F65C844BEEB7B4FB05324F20961AE865B3291C7306D58CB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetInputState.USER32 ref: 00EB38CB
                                                                                                                                                                                                                                            • TranslateAcceleratorW.USER32(?,00000000,?), ref: 00EB3922
                                                                                                                                                                                                                                            • TranslateMessage.USER32(?), ref: 00EB394B
                                                                                                                                                                                                                                            • DispatchMessageW.USER32(?), ref: 00EB3955
                                                                                                                                                                                                                                            • PeekMessageW.USER32(?,00000000,00000000,00000000,00000001), ref: 00EB3966
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Message$Translate$AcceleratorDispatchInputPeekState
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2256411358-0
                                                                                                                                                                                                                                            • Opcode ID: dc01d18e4c4d446e3876b5eb96921b573e6120377a83fe4a74e6a56e34579d24
                                                                                                                                                                                                                                            • Instruction ID: c6728e7153dd4feb5041d68c68f5db282ea6e8817dee8268f75e6e9e142d2f22
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: dc01d18e4c4d446e3876b5eb96921b573e6120377a83fe4a74e6a56e34579d24
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 1131F770504346AEEB35CB35AC4ABF737A8EB45308F14556EE562F20E4E7B0A684DB11
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • InternetQueryDataAvailable.WININET(?,?,00000000,00000000,00000000,?,00000000,?,?,?,00EBC21E,00000000), ref: 00EBCF38
                                                                                                                                                                                                                                            • InternetReadFile.WININET(?,00000000,?,?), ref: 00EBCF6F
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(?,00000000,?,?,?,00EBC21E,00000000), ref: 00EBCFB4
                                                                                                                                                                                                                                            • SetEvent.KERNEL32(?,?,00000000,?,?,?,00EBC21E,00000000), ref: 00EBCFC8
                                                                                                                                                                                                                                            • SetEvent.KERNEL32(?,?,00000000,?,?,?,00EBC21E,00000000), ref: 00EBCFF2
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: EventInternet$AvailableDataErrorFileLastQueryRead
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3191363074-0
                                                                                                                                                                                                                                            • Opcode ID: db21041466e704874fabf1d39b893c22068ffae5205cac6ff16079dadd86be1f
                                                                                                                                                                                                                                            • Instruction ID: ebd7083ffc46257bbc1cc54fab4837c6c59a6fdefd3c0d55717972259e33a59b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: db21041466e704874fabf1d39b893c22068ffae5205cac6ff16079dadd86be1f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: AC317F71608206AFDB20DFA5D884AFBBBF9EB04355B20546EF506F2110DB30ED44DB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetWindowRect.USER32(?,?), ref: 00EA1915
                                                                                                                                                                                                                                            • PostMessageW.USER32(00000001,00000201,00000001), ref: 00EA19C1
                                                                                                                                                                                                                                            • Sleep.KERNEL32(00000000,?,?,?), ref: 00EA19C9
                                                                                                                                                                                                                                            • PostMessageW.USER32(00000001,00000202,00000000), ref: 00EA19DA
                                                                                                                                                                                                                                            • Sleep.KERNEL32(00000000,?,?,?,?), ref: 00EA19E2
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessagePostSleep$RectWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3382505437-0
                                                                                                                                                                                                                                            • Opcode ID: abbb4e803998ab71ff554713817aab1b2926695a6e3632324af8e15125375e15
                                                                                                                                                                                                                                            • Instruction ID: 9ae2c9aff18c90bc5f528b2adfab5caa044e1170d5e16431cf0b92fc0fdb2b60
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: abbb4e803998ab71ff554713817aab1b2926695a6e3632324af8e15125375e15
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7931BF71A00219EFCB00CFA8DD99ADE3BB5EB49319F105269F921BB2D1C770A944CB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001053,000000FF,?), ref: 00ED5745
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001074,?,00000001), ref: 00ED579D
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ED57AF
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ED57BA
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00ED5816
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$_wcslen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 763830540-0
                                                                                                                                                                                                                                            • Opcode ID: 7853552fc24abcfea64eb0c5ac2e4d8574659fcff593a9d0fdde61b70bbf8ef4
                                                                                                                                                                                                                                            • Instruction ID: 28abeefc88f35858909d67efaf2f1050308fd46c2695c9a7c6265eae038dc50d
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 7853552fc24abcfea64eb0c5ac2e4d8574659fcff593a9d0fdde61b70bbf8ef4
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4A218272904618DADB209FA4DC85AEE77B8FF44764F109217F929FA2C0D7708986CF51
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • IsWindow.USER32(00000000), ref: 00EC0951
                                                                                                                                                                                                                                            • GetForegroundWindow.USER32 ref: 00EC0968
                                                                                                                                                                                                                                            • GetDC.USER32(00000000), ref: 00EC09A4
                                                                                                                                                                                                                                            • GetPixel.GDI32(00000000,?,00000003), ref: 00EC09B0
                                                                                                                                                                                                                                            • ReleaseDC.USER32(00000000,00000003), ref: 00EC09E8
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$ForegroundPixelRelease
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 4156661090-0
                                                                                                                                                                                                                                            • Opcode ID: 3d5ec06e6be6a2ec547238e01b0d41292d55be7854571635f366bf40965ef50d
                                                                                                                                                                                                                                            • Instruction ID: 850208b914a90bea2fc945abd24a45b807ec483a6b797e2048a9e1ebefe1b1ad
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 3d5ec06e6be6a2ec547238e01b0d41292d55be7854571635f366bf40965ef50d
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D5216F35600214AFD704EF65D984AAFBBF9EF84740F14806DE85AA7752CB34EC05CB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetEnvironmentStringsW.KERNEL32 ref: 00E7CDC6
                                                                                                                                                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000000), ref: 00E7CDE9
                                                                                                                                                                                                                                              • Part of subcall function 00E73820: RtlAllocateHeap.NTDLL(00000000,?,00F11444,?,00E5FDF5,?,?,00E4A976,00000010,00F11440,00E413FC,?,00E413C6,?,00E41129), ref: 00E73852
                                                                                                                                                                                                                                            • WideCharToMultiByte.KERNEL32(00000000,00000000,00000000,00000000,00000000,?,00000000,00000000), ref: 00E7CE0F
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7CE22
                                                                                                                                                                                                                                            • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 00E7CE31
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ByteCharEnvironmentMultiStringsWide$AllocateFreeHeap_free
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 336800556-0
                                                                                                                                                                                                                                            • Opcode ID: 8e211bed2e476e3251588a7bedc831112cb66962ebc9b52ff9bccfb33699438e
                                                                                                                                                                                                                                            • Instruction ID: 2bc6deab2bb7af8136acedee3283433536b9666fe269d0baed958d564dc1eb13
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 8e211bed2e476e3251588a7bedc831112cb66962ebc9b52ff9bccfb33699438e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B701D8726026157F272116B76C48C7F6B6DDFC6BA5335912EFA0DF7100DA608D0281B1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E59693
                                                                                                                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 00E596A2
                                                                                                                                                                                                                                            • BeginPath.GDI32(?), ref: 00E596B9
                                                                                                                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 00E596E2
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ObjectSelect$BeginCreatePath
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3225163088-0
                                                                                                                                                                                                                                            • Opcode ID: 02d8046ec9496c37e41cfc7a31732ca4a9a44cd749eac77ec1b447dd00859b99
                                                                                                                                                                                                                                            • Instruction ID: 96edd93b0ff5e1762962b1063070f3ed5d6b03a05127e4a10152ee35680e4a56
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 02d8046ec9496c37e41cfc7a31732ca4a9a44cd749eac77ec1b447dd00859b99
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: CD217F7080230AEFDB119F25EC157E97BB9FB0039AF518616F920B61A1D3B4589DEF90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _memcmp
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2931989736-0
                                                                                                                                                                                                                                            • Opcode ID: 4623e1739c9d2d9416b92bf413b6ed4ce56eae1b2a4949f867b583ac571056a9
                                                                                                                                                                                                                                            • Instruction ID: 7cd66e6c8aa6c6658acfb82ecf304b474b2c4f2f2ee5da72dfcea1b05c795d9e
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 4623e1739c9d2d9416b92bf413b6ed4ce56eae1b2a4949f867b583ac571056a9
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 5E019663681B15FAD21896109D42EFA639CDB263A8B046423FD16BE741F760FD2182A4
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(?,?,?,00E6F2DE,00E73863,00F11444,?,00E5FDF5,?,?,00E4A976,00000010,00F11440,00E413FC,?,00E413C6), ref: 00E72DFD
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72E32
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72E59
                                                                                                                                                                                                                                            • SetLastError.KERNEL32(00000000,00E41129), ref: 00E72E66
                                                                                                                                                                                                                                            • SetLastError.KERNEL32(00000000,00E41129), ref: 00E72E6F
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorLast$_free
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3170660625-0
                                                                                                                                                                                                                                            • Opcode ID: 286a2a932e646297557da1f03f9c8c0871f9d3ae9e5841b10a81b281411a1d16
                                                                                                                                                                                                                                            • Instruction ID: 19c694f109b8a64850f39f713806696a292162cfa5efd4de4476ca35cfdaec15
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 286a2a932e646297557da1f03f9c8c0871f9d3ae9e5841b10a81b281411a1d16
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2D01F4326056017BCA1327357C45D6B2699EBC57A9B34E12DFA2DB22D7EF608C455120
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CLSIDFromProgID.OLE32(?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E9FF41,80070057,?,?,?,00EA035E), ref: 00EA002B
                                                                                                                                                                                                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E9FF41,80070057,?,?), ref: 00EA0046
                                                                                                                                                                                                                                            • lstrcmpiW.KERNEL32(?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E9FF41,80070057,?,?), ref: 00EA0054
                                                                                                                                                                                                                                            • CoTaskMemFree.OLE32(00000000,?,00000000,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E9FF41,80070057,?), ref: 00EA0064
                                                                                                                                                                                                                                            • CLSIDFromString.OLE32(?,?,?,?,?,00000000,?,?,?,-C000001E,00000001,?,00E9FF41,80070057,?,?), ref: 00EA0070
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: From$Prog$FreeStringTasklstrcmpi
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3897988419-0
                                                                                                                                                                                                                                            • Opcode ID: 96121ec54e96c2ce0623c10d480e5f7ad02d8d1ccccee6345f4d8435bf5f95ca
                                                                                                                                                                                                                                            • Instruction ID: 7444c391303644cf44aa893cc0f81cbe286243414928a68390714c92e92bf72a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 96121ec54e96c2ce0623c10d480e5f7ad02d8d1ccccee6345f4d8435bf5f95ca
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 0E01DF76601205BFDB114F69EC84FAA7BAEEB48391F205525F901FA210D770ED04EBA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • QueryPerformanceCounter.KERNEL32(?), ref: 00EAE997
                                                                                                                                                                                                                                            • QueryPerformanceFrequency.KERNEL32(?), ref: 00EAE9A5
                                                                                                                                                                                                                                            • Sleep.KERNEL32(00000000), ref: 00EAE9AD
                                                                                                                                                                                                                                            • QueryPerformanceCounter.KERNEL32(?), ref: 00EAE9B7
                                                                                                                                                                                                                                            • Sleep.KERNEL32 ref: 00EAE9F3
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: PerformanceQuery$CounterSleep$Frequency
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2833360925-0
                                                                                                                                                                                                                                            • Opcode ID: f9a13e6ec150ada6519e59df6a1252185b470ecd992cbc07d43dc29173e75878
                                                                                                                                                                                                                                            • Instruction ID: e3d63f35112c54a2666c8e82089d6d7e4d206e70a9d1a55f17bfa369f46f7330
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f9a13e6ec150ada6519e59df6a1252185b470ecd992cbc07d43dc29173e75878
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 59011E31C02629DBCF049BE5E8596DEBBB8FB4E701F101596D502B6251CB30A555C761
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetUserObjectSecurity.USER32(?,00000004,?,00000000,?), ref: 00EA1114
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(?,00000000,00000000,?,?,00EA0B9B,?,?,?), ref: 00EA1120
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000000,00000000,?,?,00EA0B9B,?,?,?), ref: 00EA112F
                                                                                                                                                                                                                                            • HeapAlloc.KERNEL32(00000000,?,00000000,00000000,?,?,00EA0B9B,?,?,?), ref: 00EA1136
                                                                                                                                                                                                                                            • GetUserObjectSecurity.USER32(?,00000004,00000000,?,?), ref: 00EA114D
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: HeapObjectSecurityUser$AllocErrorLastProcess
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 842720411-0
                                                                                                                                                                                                                                            • Opcode ID: 31454a0a9608b3db796ffc5d33f8fc8f3d3ff7ca17912d6e98bb23ef8a9baadf
                                                                                                                                                                                                                                            • Instruction ID: 47d7a2c050437b53b17b8c7ff0b2009dba360d369c0c3795d0176d19cc3eef03
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 31454a0a9608b3db796ffc5d33f8fc8f3d3ff7ca17912d6e98bb23ef8a9baadf
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4A016D75102216BFDB114F65EC49A6A3B7EEF8A3A4B200456FA41E7350DA31DC40DA60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetTokenInformation.ADVAPI32(?,00000002,?,00000000,?), ref: 00EA0FCA
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(?,00000002,?,00000000,?), ref: 00EA0FD6
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,00000002,?,00000000,?), ref: 00EA0FE5
                                                                                                                                                                                                                                            • HeapAlloc.KERNEL32(00000000,?,00000002,?,00000000,?), ref: 00EA0FEC
                                                                                                                                                                                                                                            • GetTokenInformation.ADVAPI32(?,00000002,00000000,?,?,?,00000002,?,00000000,?), ref: 00EA1002
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 44706859-0
                                                                                                                                                                                                                                            • Opcode ID: 02ff084c8d1b68331c6aa745fc8bd3d8b14f42a238fe9d2d0555106af9166e73
                                                                                                                                                                                                                                            • Instruction ID: 7c77fcc91fead49e183515841903845c7a65768db442f8b3c8d980066b8ca2d7
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 02ff084c8d1b68331c6aa745fc8bd3d8b14f42a238fe9d2d0555106af9166e73
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B1F0C235102312EFD7210FA5EC8DF563B6EEF8A7A1F210455F905EB290CA30EC40CA60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00EA102A
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00EA1036
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EA1045
                                                                                                                                                                                                                                            • HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00EA104C
                                                                                                                                                                                                                                            • GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EA1062
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: HeapInformationToken$AllocErrorLastProcess
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 44706859-0
                                                                                                                                                                                                                                            • Opcode ID: 18516ab73edff971aeb3cb4e5f38c300e2424b85c7d698aa45adb3b07ecd351a
                                                                                                                                                                                                                                            • Instruction ID: 46cb90a7561caadf5b62cc306215be335a7b23694a0d98121feeb7d4df6a8802
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 18516ab73edff971aeb3cb4e5f38c300e2424b85c7d698aa45adb3b07ecd351a
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 11F0C235102312EFD7211FA5EC48F563B6DEF8A7A1F200455F905EB290CA70E840DA60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,00EB017D,?,00EB32FC,?,00000001,00E82592,?), ref: 00EB0324
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,00EB017D,?,00EB32FC,?,00000001,00E82592,?), ref: 00EB0331
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,00EB017D,?,00EB32FC,?,00000001,00E82592,?), ref: 00EB033E
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,00EB017D,?,00EB32FC,?,00000001,00E82592,?), ref: 00EB034B
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,00EB017D,?,00EB32FC,?,00000001,00E82592,?), ref: 00EB0358
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(?,?,?,?,00EB017D,?,00EB32FC,?,00000001,00E82592,?), ref: 00EB0365
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CloseHandle
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2962429428-0
                                                                                                                                                                                                                                            • Opcode ID: f426876a7d5014a6726304705876ebb49322127cf1dce596496e5d73ae446639
                                                                                                                                                                                                                                            • Instruction ID: 78392f5885e1dd9961208f84140a4a92bd5d30d7fb00fb11d704c16a696bcd54
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f426876a7d5014a6726304705876ebb49322127cf1dce596496e5d73ae446639
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 8F019872801B159FCB30AF66D890857FBF9BF602193159A3FD19662931C7B1B998CE80
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7D752
                                                                                                                                                                                                                                              • Part of subcall function 00E729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00E7D7D1,00000000,00000000,00000000,00000000,?,00E7D7F8,00000000,00000007,00000000,?,00E7DBF5,00000000), ref: 00E729DE
                                                                                                                                                                                                                                              • Part of subcall function 00E729C8: GetLastError.KERNEL32(00000000,?,00E7D7D1,00000000,00000000,00000000,00000000,?,00E7D7F8,00000000,00000007,00000000,?,00E7DBF5,00000000,00000000), ref: 00E729F0
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7D764
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7D776
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7D788
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7D79A
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 776569668-0
                                                                                                                                                                                                                                            • Opcode ID: 89767dfb9f3cf4f79e66ec8e3085421ecaa4f5182c64b26ebf1a35078788a09f
                                                                                                                                                                                                                                            • Instruction ID: 0f2aa021962741d8a21089b66f5c351f36036ac5fd86597201046be43c65df55
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 89767dfb9f3cf4f79e66ec8e3085421ecaa4f5182c64b26ebf1a35078788a09f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 8AF0F4325442086BC615EB78FDC5C167BEDBF84714B98A90AF24DF7541C720FC8057A4
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetDlgItem.USER32(?,000003E9), ref: 00EA5C58
                                                                                                                                                                                                                                            • GetWindowTextW.USER32(00000000,?,00000100), ref: 00EA5C6F
                                                                                                                                                                                                                                            • MessageBeep.USER32(00000000), ref: 00EA5C87
                                                                                                                                                                                                                                            • KillTimer.USER32(?,0000040A), ref: 00EA5CA3
                                                                                                                                                                                                                                            • EndDialog.USER32(?,00000001), ref: 00EA5CBD
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: BeepDialogItemKillMessageTextTimerWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3741023627-0
                                                                                                                                                                                                                                            • Opcode ID: d483f00ca8cf0c5ac445a47846b6a8425ee444bbd6f56343f898b4005d0b6c11
                                                                                                                                                                                                                                            • Instruction ID: 1df7a4f36c46794eb65754a06a7ff6c982cfc70f1d19324ca0702e948f66677f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: d483f00ca8cf0c5ac445a47846b6a8425ee444bbd6f56343f898b4005d0b6c11
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9701DB315007049FEB205B11FD4EFD6B7B8FB05B45F04125AA553750E0D7F0A988CE50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E722BE
                                                                                                                                                                                                                                              • Part of subcall function 00E729C8: RtlFreeHeap.NTDLL(00000000,00000000,?,00E7D7D1,00000000,00000000,00000000,00000000,?,00E7D7F8,00000000,00000007,00000000,?,00E7DBF5,00000000), ref: 00E729DE
                                                                                                                                                                                                                                              • Part of subcall function 00E729C8: GetLastError.KERNEL32(00000000,?,00E7D7D1,00000000,00000000,00000000,00000000,?,00E7D7F8,00000000,00000007,00000000,?,00E7DBF5,00000000,00000000), ref: 00E729F0
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E722D0
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E722E3
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E722F4
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E72305
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _free$ErrorFreeHeapLast
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 776569668-0
                                                                                                                                                                                                                                            • Opcode ID: 2800826fc0d51c5b41c8c126e872f9fa26adf9201f00b0feb81a1e53bb48c381
                                                                                                                                                                                                                                            • Instruction ID: e65591eb819ed53545c59c5401482ce965ab5dac436fccc7917a3d2953c789dc
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 2800826fc0d51c5b41c8c126e872f9fa26adf9201f00b0feb81a1e53bb48c381
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 85F030704011588BC712AF64BC028897BE5F758750B07D60EF718E22B1CB750492BBE4
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • EndPath.GDI32(?), ref: 00E595D4
                                                                                                                                                                                                                                            • StrokeAndFillPath.GDI32(?,?,00E971F7,00000000,?,?,?), ref: 00E595F0
                                                                                                                                                                                                                                            • SelectObject.GDI32(?,00000000), ref: 00E59603
                                                                                                                                                                                                                                            • DeleteObject.GDI32 ref: 00E59616
                                                                                                                                                                                                                                            • StrokePath.GDI32(?), ref: 00E59631
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Path$ObjectStroke$DeleteFillSelect
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2625713937-0
                                                                                                                                                                                                                                            • Opcode ID: 6bbf8f66ed69c308f6845e42e128ba2d140a9d3f3db74ebb79ea42ce467da8a2
                                                                                                                                                                                                                                            • Instruction ID: b21b9a874611965ea41406fd076b523946a4e7cf33b05fcab4e5a232b6ed61ed
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 6bbf8f66ed69c308f6845e42e128ba2d140a9d3f3db74ebb79ea42ce467da8a2
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2DF01430006209EFDB225F6AED18BE43B61FB003A6F548215FA25690F1C77189ADEF20
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: __freea$_free
                                                                                                                                                                                                                                            • String ID: a/p$am/pm
                                                                                                                                                                                                                                            • API String ID: 3432400110-3206640213
                                                                                                                                                                                                                                            • Opcode ID: e1239504ff7f474e1f0f45ef7139a7fb6d2dc2386d3d4c32ebddb557d0b1aae2
                                                                                                                                                                                                                                            • Instruction ID: 79363974f0a2caa56b8139e7d365087b392a91a3c31ee3966ad40b883119d734
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: e1239504ff7f474e1f0f45ef7139a7fb6d2dc2386d3d4c32ebddb557d0b1aae2
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C9D13331900346EADB288F6CC885BFAB7B0EF01308F25E199E90DBB651D3359D80DB91
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID: JO
                                                                                                                                                                                                                                            • API String ID: 0-1663374661
                                                                                                                                                                                                                                            • Opcode ID: 42e9b3fc98ac9d42533902c57b8753ebd6683c8a3567b622775da0b7d2c31167
                                                                                                                                                                                                                                            • Instruction ID: 711b3b0861085b4973cd48a19efda04023994b12bed7da3b534e520157357ea4
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 42e9b3fc98ac9d42533902c57b8753ebd6683c8a3567b622775da0b7d2c31167
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: CE51CD72D0060A9FCB21DFA4D845BFEBBB8EF05314F14A15AF409B7291D7B19A019B61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(0000FDE9,00000000,?,00000002,00000000,?,?,?,00000000,?,?,?,?), ref: 00E78B6E
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(?,?,00000000,?,?,?,?,?,?,?,?,00000000,00001000,?), ref: 00E78B7A
                                                                                                                                                                                                                                            • __dosmaperr.LIBCMT ref: 00E78B81
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ByteCharErrorLastMultiWide__dosmaperr
                                                                                                                                                                                                                                            • String ID: .
                                                                                                                                                                                                                                            • API String ID: 2434981716-3963672497
                                                                                                                                                                                                                                            • Opcode ID: 15eaf04ec6a3e2ceca022eeca67ee18efd65f2d46f121f1461ed7202f5db236f
                                                                                                                                                                                                                                            • Instruction ID: fa8d5bb16e6b8ecbd6563aa16254f46a6b8ab2c2d574a6daa59093ced2a85889
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 15eaf04ec6a3e2ceca022eeca67ee18efd65f2d46f121f1461ed7202f5db236f
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 8141AC74604045AFCB249F24D989ABD3FE5DF95304F28E1AAF88CA7242DE318C03A790
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EAB403: WriteProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00EA21D0,?,?,00000034,00000800,?,00000034), ref: 00EAB42D
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001104,00000000,00000000), ref: 00EA2760
                                                                                                                                                                                                                                              • Part of subcall function 00EAB3CE: ReadProcessMemory.KERNEL32(?,?,?,00000000,00000000,00000000,?,00EA21FF,?,?,00000800,?,00001073,00000000,?,?), ref: 00EAB3F8
                                                                                                                                                                                                                                              • Part of subcall function 00EAB32A: GetWindowThreadProcessId.USER32(?,?), ref: 00EAB355
                                                                                                                                                                                                                                              • Part of subcall function 00EAB32A: OpenProcess.KERNEL32(00000438,00000000,?,?,?,00EA2194,00000034,?,?,00001004,00000000,00000000), ref: 00EAB365
                                                                                                                                                                                                                                              • Part of subcall function 00EAB32A: VirtualAllocEx.KERNEL32(00000000,00000000,?,00001000,00000004,?,?,00EA2194,00000034,?,?,00001004,00000000,00000000), ref: 00EAB37B
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00EA27CD
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001111,00000000,00000000), ref: 00EA281A
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Process$MessageSend$Memory$AllocOpenReadThreadVirtualWindowWrite
                                                                                                                                                                                                                                            • String ID: @
                                                                                                                                                                                                                                            • API String ID: 4150878124-2766056989
                                                                                                                                                                                                                                            • Opcode ID: 534e84e9ffff583c87ed146a723acaa7708dd14a0f9f1d70a481a31a87190cc4
                                                                                                                                                                                                                                            • Instruction ID: 9a16392ed31f36d3fa3d1925896d3285d41cc600fa1069b4df2214cd7bc86278
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 534e84e9ffff583c87ed146a723acaa7708dd14a0f9f1d70a481a31a87190cc4
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 91412E72900218AFDB10DFA4CD45ADEBBB8EF0A700F105099FA55BB181DB707E49CB61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetModuleFileNameW.KERNEL32(00000000,C:\Users\user\Desktop\file.exe,00000104), ref: 00E71769
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E71834
                                                                                                                                                                                                                                            • _free.LIBCMT ref: 00E7183E
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _free$FileModuleName
                                                                                                                                                                                                                                            • String ID: C:\Users\user\Desktop\file.exe
                                                                                                                                                                                                                                            • API String ID: 2506810119-1957095476
                                                                                                                                                                                                                                            • Opcode ID: f0de03eff4dabeb4b7573dfb4fe157a85cabfeb7af824f9f6993c990c910f2b3
                                                                                                                                                                                                                                            • Instruction ID: a57ff9def3c2e8460bba43a35f9d801641de3cc91962fa96e032715a57bebcbf
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f0de03eff4dabeb4b7573dfb4fe157a85cabfeb7af824f9f6993c990c910f2b3
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: FB318071A00358AFDB25DF99D881D9EBBFCEB85310B1491AAF908E7211D6708E40DB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetMenuItemInfoW.USER32(00000004,00000000,00000000,?), ref: 00EAC306
                                                                                                                                                                                                                                            • DeleteMenu.USER32(?,00000007,00000000), ref: 00EAC34C
                                                                                                                                                                                                                                            • DeleteMenu.USER32(?,00000000,00000000,?,00000000,00000000,00F11990,01027C98), ref: 00EAC395
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Menu$Delete$InfoItem
                                                                                                                                                                                                                                            • String ID: 0
                                                                                                                                                                                                                                            • API String ID: 135850232-4108050209
                                                                                                                                                                                                                                            • Opcode ID: 62baf5b57b6138a21614c0291b9acc3fa58a1b2113dfbb026950c8716d1e0b2e
                                                                                                                                                                                                                                            • Instruction ID: 147338d728e213bc40fe0f33075cf6917c662c7645ebafba140564f7880a5a96
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 62baf5b57b6138a21614c0291b9acc3fa58a1b2113dfbb026950c8716d1e0b2e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: DD41B6312043019FDB24DF25D844B5ABBE4EF8A314F24966DF965AB2D1D770F908CB52
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,00000013,?,?,SysTreeView32,00EDCC08,00000000,?,?,?,?), ref: 00ED44AA
                                                                                                                                                                                                                                            • GetWindowLongW.USER32 ref: 00ED44C7
                                                                                                                                                                                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00ED44D7
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$Long
                                                                                                                                                                                                                                            • String ID: SysTreeView32
                                                                                                                                                                                                                                            • API String ID: 847901565-1698111956
                                                                                                                                                                                                                                            • Opcode ID: bc4fac9f7f90270a69a0e95467595796619dfa97ee4dc6cbdc0e79c7b7ce097c
                                                                                                                                                                                                                                            • Instruction ID: f4e7309c2971d5131bac03f48c922d94844e0c3b454c94efd4aa8e64ae3f3524
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: bc4fac9f7f90270a69a0e95467595796619dfa97ee4dc6cbdc0e79c7b7ce097c
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 92318D71210206AFDF219E38EC45BEA77A9EB18338F206716F975A22D0D770EC969750
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SysReAllocString.OLEAUT32(?,?), ref: 00EA6EED
                                                                                                                                                                                                                                            • VariantCopyInd.OLEAUT32(?,?), ref: 00EA6F08
                                                                                                                                                                                                                                            • VariantClear.OLEAUT32(?), ref: 00EA6F12
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Variant$AllocClearCopyString
                                                                                                                                                                                                                                            • String ID: *j
                                                                                                                                                                                                                                            • API String ID: 2173805711-1845181700
                                                                                                                                                                                                                                            • Opcode ID: a82a0c5c02af5120b99e7493cd7eaac95f42710ceb1f1baa257e4d08787ff74c
                                                                                                                                                                                                                                            • Instruction ID: 1bf968b1655257d7a597c45bea22f64bf146efd910545158aa018b3ccc740453
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a82a0c5c02af5120b99e7493cd7eaac95f42710ceb1f1baa257e4d08787ff74c
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7531B175704215DFCB04AFA4E8519BD77B6EF8B304B141499F8026F2A1C734E916DBD0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EC335B: WideCharToMultiByte.KERNEL32(00000000,00000000,?,?,00000000,00000000,00000000,00000000,?,?,?,?,?,00EC3077,?,?), ref: 00EC3378
                                                                                                                                                                                                                                            • inet_addr.WSOCK32(?,?,?,?,?,00000000), ref: 00EC307A
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EC309B
                                                                                                                                                                                                                                            • htons.WSOCK32(00000000,?,?,00000000), ref: 00EC3106
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ByteCharMultiWide_wcslenhtonsinet_addr
                                                                                                                                                                                                                                            • String ID: 255.255.255.255
                                                                                                                                                                                                                                            • API String ID: 946324512-2422070025
                                                                                                                                                                                                                                            • Opcode ID: abdadaaf70145b92187e893ae56789abfe46c910027acf83e9dc30ffcd70d2fc
                                                                                                                                                                                                                                            • Instruction ID: 82b254272116de5906a97e65622141bb0e56bbfe8f86c201051f37d155e0578a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: abdadaaf70145b92187e893ae56789abfe46c910027acf83e9dc30ffcd70d2fc
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 0031A33A6002019FCB10CF39D686FAA77E0EF54318F28D059E915AB392D732EE46C761
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00001009,00000000,?), ref: 00ED3F40
                                                                                                                                                                                                                                            • SetWindowPos.USER32(?,00000000,?,?,?,?,00000004), ref: 00ED3F54
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00ED3F78
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$Window
                                                                                                                                                                                                                                            • String ID: SysMonthCal32
                                                                                                                                                                                                                                            • API String ID: 2326795674-1439706946
                                                                                                                                                                                                                                            • Opcode ID: 9a0336cae2568fe7907dd5f5dc81d82384319f9eddd03161557528a24f1fde62
                                                                                                                                                                                                                                            • Instruction ID: 43313cc4a2ae874ff9bda89ec4204d1d2f8de555ea211939444cecba48ec3db5
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9a0336cae2568fe7907dd5f5dc81d82384319f9eddd03161557528a24f1fde62
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2421AD32600219BFDF218F60DC46FEA3BB6EB48718F111215FA157B2D0D6B1E855DB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000469,?,00000000), ref: 00ED4705
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000465,00000000,80017FFF), ref: 00ED4713
                                                                                                                                                                                                                                            • DestroyWindow.USER32(00000000,00000000,?,?,?,00000000,msctls_updown32,00000000,00000000,00000000,00000000,00000000,00000000,?,?,00000000), ref: 00ED471A
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$DestroyWindow
                                                                                                                                                                                                                                            • String ID: msctls_updown32
                                                                                                                                                                                                                                            • API String ID: 4014797782-2298589950
                                                                                                                                                                                                                                            • Opcode ID: f86fbbc50f7583eb00dd39209b388aaa2cbdecd44331c83bb5940f41f3d6c6d9
                                                                                                                                                                                                                                            • Instruction ID: ddad5523a81194be1017c5f5903bb85759fdb9c79842cb5d381445d90edacbf5
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f86fbbc50f7583eb00dd39209b388aaa2cbdecd44331c83bb5940f41f3d6c6d9
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2D2151F5600209AFEB10DF64DCC1DA737EDEB5A3A8B14105AF610A7391CB71EC12DA60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen
                                                                                                                                                                                                                                            • String ID: #OnAutoItStartRegister$#notrayicon$#requireadmin
                                                                                                                                                                                                                                            • API String ID: 176396367-2734436370
                                                                                                                                                                                                                                            • Opcode ID: 0060ac4d44dfe3460f60fda7b8566a39a461c15d6fb7833694cdeacb7b13c409
                                                                                                                                                                                                                                            • Instruction ID: 1d98ce326d18496520cef90a5a52cf5b25fb8acc13f31e6880b524633ef6c491
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 0060ac4d44dfe3460f60fda7b8566a39a461c15d6fb7833694cdeacb7b13c409
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D121357264421166D331EA24AC02FBB73D8DF9A314F106426F94ABF182EB51BD52C2E5
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000180,00000000,?), ref: 00ED3840
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000186,00000000,00000000), ref: 00ED3850
                                                                                                                                                                                                                                            • MoveWindow.USER32(00000000,?,?,?,?,00000000,?,?,Listbox,00000000,00000000,?,?,?,?,?), ref: 00ED3876
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend$MoveWindow
                                                                                                                                                                                                                                            • String ID: Listbox
                                                                                                                                                                                                                                            • API String ID: 3315199576-2633736733
                                                                                                                                                                                                                                            • Opcode ID: a8714103e5e488eb544ed7d1e16fb96abb7eefaa25bed9419e9240bea7763c2d
                                                                                                                                                                                                                                            • Instruction ID: 7839afd483a48a3b45aff4310c0440d487b00c366db7fc36c346673ad3e0b482
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a8714103e5e488eb544ed7d1e16fb96abb7eefaa25bed9419e9240bea7763c2d
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 8721F272600218BFEF218F64DC41FBB376EEF89754F109116F900AB290C671DC1297A1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SetErrorMode.KERNEL32(00000001), ref: 00EB4A08
                                                                                                                                                                                                                                            • GetVolumeInformationW.KERNEL32(?,?,00007FFF,?,00000000,00000000,00000000,00000000), ref: 00EB4A5C
                                                                                                                                                                                                                                            • SetErrorMode.KERNEL32(00000000,?,?,00EDCC08), ref: 00EB4AD0
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorMode$InformationVolume
                                                                                                                                                                                                                                            • String ID: %lu
                                                                                                                                                                                                                                            • API String ID: 2507767853-685833217
                                                                                                                                                                                                                                            • Opcode ID: b16e5bb8456a00d46ba7c8458075a3fc7a8701e99b12415c07b30b1f63208282
                                                                                                                                                                                                                                            • Instruction ID: ba811b3137ca246a2fcc93e8136cba30e50e651ddfae59aad3f4bea3de6158fa
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b16e5bb8456a00d46ba7c8458075a3fc7a8701e99b12415c07b30b1f63208282
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: BE315E71A00219AFDB10DF54C885EAABBF8EF08308F1490A5F909EB253D771ED46CB61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000405,00000000,00000000), ref: 00ED424F
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000406,00000000,00640000), ref: 00ED4264
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000414,0000000A,00000000), ref: 00ED4271
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend
                                                                                                                                                                                                                                            • String ID: msctls_trackbar32
                                                                                                                                                                                                                                            • API String ID: 3850602802-1010561917
                                                                                                                                                                                                                                            • Opcode ID: a909184fcf419c6ac527439e339c167a142b082150add3b0b2aee2420c7933ef
                                                                                                                                                                                                                                            • Instruction ID: 9b4af89a3c44217aead5768ed787665d8f5e42191f51c593aa2ad765b1430bac
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a909184fcf419c6ac527439e339c167a142b082150add3b0b2aee2420c7933ef
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2311E371240208BFEF205E69CC06FAB3BACEF95B68F111115FA55F61E0D671D8129B10
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E46B57: _wcslen.LIBCMT ref: 00E46B6A
                                                                                                                                                                                                                                              • Part of subcall function 00EA2DA7: SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00EA2DC5
                                                                                                                                                                                                                                              • Part of subcall function 00EA2DA7: GetWindowThreadProcessId.USER32(?,00000000), ref: 00EA2DD6
                                                                                                                                                                                                                                              • Part of subcall function 00EA2DA7: GetCurrentThreadId.KERNEL32 ref: 00EA2DDD
                                                                                                                                                                                                                                              • Part of subcall function 00EA2DA7: AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00EA2DE4
                                                                                                                                                                                                                                            • GetFocus.USER32 ref: 00EA2F78
                                                                                                                                                                                                                                              • Part of subcall function 00EA2DEE: GetParent.USER32(00000000), ref: 00EA2DF9
                                                                                                                                                                                                                                            • GetClassNameW.USER32(?,?,00000100), ref: 00EA2FC3
                                                                                                                                                                                                                                            • EnumChildWindows.USER32(?,00EA303B), ref: 00EA2FEB
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Thread$AttachChildClassCurrentEnumFocusInputMessageNameParentProcessSendTimeoutWindowWindows_wcslen
                                                                                                                                                                                                                                            • String ID: %s%d
                                                                                                                                                                                                                                            • API String ID: 1272988791-1110647743
                                                                                                                                                                                                                                            • Opcode ID: 0362dba1f4b8b1a9b3cb285e1aba45691725f9f96183ab80433641450f238f0b
                                                                                                                                                                                                                                            • Instruction ID: 3f5fae523b1e91279ed15f94f7a4c323ba2716baba336ca6aa8155505a93597b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 0362dba1f4b8b1a9b3cb285e1aba45691725f9f96183ab80433641450f238f0b
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D41196716002055BCF146F749C85EED77A9DF89308F145075FE09BF192DE70A949DB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00ED58C1
                                                                                                                                                                                                                                            • SetMenuItemInfoW.USER32(?,?,?,00000030), ref: 00ED58EE
                                                                                                                                                                                                                                            • DrawMenuBar.USER32(?), ref: 00ED58FD
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Menu$InfoItem$Draw
                                                                                                                                                                                                                                            • String ID: 0
                                                                                                                                                                                                                                            • API String ID: 3227129158-4108050209
                                                                                                                                                                                                                                            • Opcode ID: a4560a6ebf6c1cd535e5a4f01624db6b339cc722d4ea646153bc27ba5f7a9cc6
                                                                                                                                                                                                                                            • Instruction ID: 23090bbff10462df08205ce6bd8e2b1b3b5a5d919dbbbc43f2b4952617e66e6e
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a4560a6ebf6c1cd535e5a4f01624db6b339cc722d4ea646153bc27ba5f7a9cc6
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D7018432500218EFDB219F15EC45BEEBBB4FF45365F10909AE859E6251DB308A85DF21
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetProcAddress.KERNEL32(?,GetSystemWow64DirectoryW), ref: 00E9D3BF
                                                                                                                                                                                                                                            • FreeLibrary.KERNEL32 ref: 00E9D3E5
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: AddressFreeLibraryProc
                                                                                                                                                                                                                                            • String ID: GetSystemWow64DirectoryW$X64
                                                                                                                                                                                                                                            • API String ID: 3013587201-2590602151
                                                                                                                                                                                                                                            • Opcode ID: 9e157bf6757c4d12f15d539337441f6450fde72d494182fb07f81a711bbc2adf
                                                                                                                                                                                                                                            • Instruction ID: ed3891ee947bb3beebe8b1a01335d152a57957255eaa80fff1ab9d240c1cbc1c
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9e157bf6757c4d12f15d539337441f6450fde72d494182fb07f81a711bbc2adf
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 93F0E53180F632DBDF7597214C589E93324EF10742FA4BA6AE802F2155DB20CD49D693
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: 1f428f921a1218c08ee32032ab0d1f6225ce3c1ba697fc11ee52809afe507f83
                                                                                                                                                                                                                                            • Instruction ID: f7fa707f98de5a2aebf3311749a10904e16ebfb768561d891c1b9dff9bef9686
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 1f428f921a1218c08ee32032ab0d1f6225ce3c1ba697fc11ee52809afe507f83
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 5EC13875A0020AAFDB14CFA8C894BAEB7B5FF49708F209598E505EF251D731EE45CB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Variant$ClearInitInitializeUninitialize
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1998397398-0
                                                                                                                                                                                                                                            • Opcode ID: be888827a63484088aba7ab07c652a3e347e22f6f0c0eca7abb89b09bdd3a132
                                                                                                                                                                                                                                            • Instruction ID: 7463e5888849321e6949a89b51e228dcbb0178211be015e02ba9c019b6389e5c
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: be888827a63484088aba7ab07c652a3e347e22f6f0c0eca7abb89b09bdd3a132
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 5FA167756042109FC700DF28C585E6AB7E5FF88314F14985DF98AAB362DB35EE06CB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • ProgIDFromCLSID.OLE32(?,00000000,?,00000000,00000800,00000000,?,00EDFC08,?), ref: 00EA05F0
                                                                                                                                                                                                                                            • CoTaskMemFree.OLE32(00000000,00000000,?,00000000,00000800,00000000,?,00EDFC08,?), ref: 00EA0608
                                                                                                                                                                                                                                            • CLSIDFromProgID.OLE32(?,?,00000000,00EDCC40,000000FF,?,00000000,00000800,00000000,?,00EDFC08,?), ref: 00EA062D
                                                                                                                                                                                                                                            • _memcmp.LIBVCRUNTIME ref: 00EA064E
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: FromProg$FreeTask_memcmp
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 314563124-0
                                                                                                                                                                                                                                            • Opcode ID: 6ad60c8405859170d7bf2f032f6da8fe74f61b845d521b143eaf4201f03f6c09
                                                                                                                                                                                                                                            • Instruction ID: 607f98472032dfb2156f945ae8a67845d28fb4608194800e8a3f99aacd6fdc5f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 6ad60c8405859170d7bf2f032f6da8fe74f61b845d521b143eaf4201f03f6c09
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 04812B75A00109EFCB04DF94C984EEEB7B9FF89315F205598E516BB250DB71AE06CB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CreateToolhelp32Snapshot.KERNEL32 ref: 00ECA6AC
                                                                                                                                                                                                                                            • Process32FirstW.KERNEL32(00000000,?), ref: 00ECA6BA
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                            • Process32NextW.KERNEL32(00000000,?), ref: 00ECA79C
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000), ref: 00ECA7AB
                                                                                                                                                                                                                                              • Part of subcall function 00E5CE60: CompareStringW.KERNEL32(00000409,00000001,?,00000000,00000000,?,?,00000000,?,00E83303,?), ref: 00E5CE8A
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Process32$CloseCompareCreateFirstHandleNextSnapshotStringToolhelp32_wcslen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1991900642-0
                                                                                                                                                                                                                                            • Opcode ID: 31a8ef45f27adf08df45fa9982a968306eb99e303f17edb048e87d61181212b1
                                                                                                                                                                                                                                            • Instruction ID: 78e3bbbdce3cd18381c443bedbadbf74291c25bc87c9c8e9f877c29257eb3706
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 31a8ef45f27adf08df45fa9982a968306eb99e303f17edb048e87d61181212b1
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: A3517B71508300AFD314EF24D886E6BBBE8FF89754F04592DF985A7262EB31D905CB92
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _free
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 269201875-0
                                                                                                                                                                                                                                            • Opcode ID: e2049d6f878ba06c942b63a65179772ada05539deaba35adb9c8e10167558467
                                                                                                                                                                                                                                            • Instruction ID: de2fa5699bfb5755bf77ee8ebc0ca8684a9e7ad43b59588ff4186fbffbd94090
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: e2049d6f878ba06c942b63a65179772ada05539deaba35adb9c8e10167558467
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D0417D31A40100ABDB217BF9AC45ABE3BEDEF41370F1462A5F43DF21A2E67448435761
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetWindowRect.USER32(?,?), ref: 00ED62E2
                                                                                                                                                                                                                                            • ScreenToClient.USER32(?,?), ref: 00ED6315
                                                                                                                                                                                                                                            • MoveWindow.USER32(?,?,?,?,000000FF,00000001,?,?,?,?,?), ref: 00ED6382
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$ClientMoveRectScreen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3880355969-0
                                                                                                                                                                                                                                            • Opcode ID: 382727c7f606b1008a10cc2e06a4488cd145ffd47ede7cd67c5dce5d8272cf01
                                                                                                                                                                                                                                            • Instruction ID: ed7ef3c5350704fc06c7ea2251643edd84dd879ed7332e0fd8dcc9c7024f4c13
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 382727c7f606b1008a10cc2e06a4488cd145ffd47ede7cd67c5dce5d8272cf01
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: CA512D74900209AFDF10DF68D8809AE7BB5FF95364F10925AF925AB3A0D730ED42CB50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • socket.WSOCK32(00000002,00000002,00000011), ref: 00EC1AFD
                                                                                                                                                                                                                                            • WSAGetLastError.WSOCK32 ref: 00EC1B0B
                                                                                                                                                                                                                                            • #21.WSOCK32(?,0000FFFF,00000020,00000002,00000004), ref: 00EC1B8A
                                                                                                                                                                                                                                            • WSAGetLastError.WSOCK32 ref: 00EC1B94
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorLast$socket
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1881357543-0
                                                                                                                                                                                                                                            • Opcode ID: 702cfca242b2c6ae904dc5a423722bfbaaadb3063ae6baffdc00742f6ffb2d3e
                                                                                                                                                                                                                                            • Instruction ID: 1fe8fc04447f65f023f47a2b621ba7f3df72558c73d5263e8aad39c98f371ca5
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 702cfca242b2c6ae904dc5a423722bfbaaadb3063ae6baffdc00742f6ffb2d3e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 8541BB34600201AFE720AF24D986F2A77E5AB45718F54948CF91AAF3D3D772ED42CB90
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: 582d45ad4665ed6982358232c169e71aa2043f081a02704233f3a2654b6e29b7
                                                                                                                                                                                                                                            • Instruction ID: d212b9d13aec51cd84143a55c4d9b9f749769f82c00eea0fec61e5c7740e6829
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 582d45ad4665ed6982358232c169e71aa2043f081a02704233f3a2654b6e29b7
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 1E411971A40304BFD724AF38CC41BAABBF9EB84710F10966EF559FB292E77199018780
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000), ref: 00EB5783
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(?,00000000), ref: 00EB57A9
                                                                                                                                                                                                                                            • DeleteFileW.KERNEL32(00000002,?,00000000), ref: 00EB57CE
                                                                                                                                                                                                                                            • CreateHardLinkW.KERNEL32(00000002,?,00000000,?,00000000), ref: 00EB57FA
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CreateHardLink$DeleteErrorFileLast
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3321077145-0
                                                                                                                                                                                                                                            • Opcode ID: d8d6f4d8bf67a143e7af84ecebad089c2b239768744b9c3f4279e3ebe5fbe2e9
                                                                                                                                                                                                                                            • Instruction ID: 7156527d8f8483fffd3aa34361b6db0c9faddfe2220cd259f7797a312e4e388a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: d8d6f4d8bf67a143e7af84ecebad089c2b239768744b9c3f4279e3ebe5fbe2e9
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: ED413D35600A11DFCB11DF15D544A5EBBE2EF89324B189899E84ABF362CB35FD00CB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000000,?,?,00000000,00000000,00E682D9,?,00E682D9,?,00000001,?,?,00000001,00E682D9,00E682D9), ref: 00E7D910
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00E7D999
                                                                                                                                                                                                                                            • GetStringTypeW.KERNEL32(?,00000000,00000000,?), ref: 00E7D9AB
                                                                                                                                                                                                                                            • __freea.LIBCMT ref: 00E7D9B4
                                                                                                                                                                                                                                              • Part of subcall function 00E73820: RtlAllocateHeap.NTDLL(00000000,?,00F11444,?,00E5FDF5,?,?,00E4A976,00000010,00F11440,00E413FC,?,00E413C6,?,00E41129), ref: 00E73852
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ByteCharMultiWide$AllocateHeapStringType__freea
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2652629310-0
                                                                                                                                                                                                                                            • Opcode ID: 4ab87cb1ce22cc9815c6659eb1810d135b5c4db2824c9b8f52377f934d68c7a3
                                                                                                                                                                                                                                            • Instruction ID: 56004ef0c587fecd4889223df945accdaf90b145b656466b97644e3c1a3fe1a2
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 4ab87cb1ce22cc9815c6659eb1810d135b5c4db2824c9b8f52377f934d68c7a3
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 1131CE72A0021AABDB249F65DC41EAE7BB5EF80354B158268FD08E6290EB75CD54CB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001024,00000000,?), ref: 00ED5352
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00ED5375
                                                                                                                                                                                                                                            • SetWindowLongW.USER32(?,000000F0,00000000), ref: 00ED5382
                                                                                                                                                                                                                                            • InvalidateRect.USER32(?,00000000,00000001,?,?,?), ref: 00ED53A8
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: LongWindow$InvalidateMessageRectSend
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3340791633-0
                                                                                                                                                                                                                                            • Opcode ID: e35aa7cc9964b49eba6a279ab20ceaf9a4aa3f6564a8cf0f2bca075f1aa392f8
                                                                                                                                                                                                                                            • Instruction ID: edafc73a8898fc41d4c36f75bb6b03d195d0f78203ce7753ff2d0f128057fa27
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: e35aa7cc9964b49eba6a279ab20ceaf9a4aa3f6564a8cf0f2bca075f1aa392f8
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4831E232A55A0CEFEB309B14CC05BE837A1EB043D4F586103FA10B63E5C7B09942EB42
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetKeyboardState.USER32(?,75C0C0D0,?,00008000), ref: 00EAABF1
                                                                                                                                                                                                                                            • SetKeyboardState.USER32(00000080,?,00008000), ref: 00EAAC0D
                                                                                                                                                                                                                                            • PostMessageW.USER32(00000000,00000101,00000000), ref: 00EAAC74
                                                                                                                                                                                                                                            • SendInput.USER32(00000001,?,0000001C,75C0C0D0,?,00008000), ref: 00EAACC6
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: KeyboardState$InputMessagePostSend
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 432972143-0
                                                                                                                                                                                                                                            • Opcode ID: 1323fb4234f62e0304ee0faeba8131fe29241d5bb670ae705dba50671935e9bc
                                                                                                                                                                                                                                            • Instruction ID: e287bfbce0c2ed0d5928478b1d60e17c1517b2d8a23b6245b8a6ae21e6b5696b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 1323fb4234f62e0304ee0faeba8131fe29241d5bb670ae705dba50671935e9bc
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4C311A309007186FFF35CB6598047FAFBA5AB4E334F0C622AE4817A1D1C375A945C752
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • ClientToScreen.USER32(?,?), ref: 00ED769A
                                                                                                                                                                                                                                            • GetWindowRect.USER32(?,?), ref: 00ED7710
                                                                                                                                                                                                                                            • PtInRect.USER32(?,?,00ED8B89), ref: 00ED7720
                                                                                                                                                                                                                                            • MessageBeep.USER32(00000000), ref: 00ED778C
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Rect$BeepClientMessageScreenWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1352109105-0
                                                                                                                                                                                                                                            • Opcode ID: 3d6e2265923eb9ddd7ff3d51c2789966ed10b708f9c961ccef6ba08834ae0aff
                                                                                                                                                                                                                                            • Instruction ID: e81973d2f1e9507e7b34afca13f96bdd1bd6d0e542645d7a52cfb8cd97e1db55
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 3d6e2265923eb9ddd7ff3d51c2789966ed10b708f9c961ccef6ba08834ae0aff
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D241BC34A092189FCB01CF58C884EA977F0FB48315F5594ABE9A4AB360E330E942CB90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetForegroundWindow.USER32 ref: 00ED16EB
                                                                                                                                                                                                                                              • Part of subcall function 00EA3A3D: GetWindowThreadProcessId.USER32(?,00000000), ref: 00EA3A57
                                                                                                                                                                                                                                              • Part of subcall function 00EA3A3D: GetCurrentThreadId.KERNEL32 ref: 00EA3A5E
                                                                                                                                                                                                                                              • Part of subcall function 00EA3A3D: AttachThreadInput.USER32(00000000,?,00000000,00000000,?,00EA25B3), ref: 00EA3A65
                                                                                                                                                                                                                                            • GetCaretPos.USER32(?), ref: 00ED16FF
                                                                                                                                                                                                                                            • ClientToScreen.USER32(00000000,?), ref: 00ED174C
                                                                                                                                                                                                                                            • GetForegroundWindow.USER32 ref: 00ED1752
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ThreadWindow$Foreground$AttachCaretClientCurrentInputProcessScreen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2759813231-0
                                                                                                                                                                                                                                            • Opcode ID: 6479599717cdd6e7652347ad5002ac7c6c161caf00bd3813cdd4ee039debcf75
                                                                                                                                                                                                                                            • Instruction ID: e5be881473e7a8da7a368949b1abb3619993eab547a32e1b090482835c5ca21d
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 6479599717cdd6e7652347ad5002ac7c6c161caf00bd3813cdd4ee039debcf75
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: BB316F75E01249AFC700EFAAD881CAEBBF9EF49304B5490AAE415F7211D731DE45CBA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E47620: _wcslen.LIBCMT ref: 00E47625
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EADFCB
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EADFE2
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EAE00D
                                                                                                                                                                                                                                            • GetTextExtentPoint32W.GDI32(?,00000000,00000000,?), ref: 00EAE018
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen$ExtentPoint32Text
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3763101759-0
                                                                                                                                                                                                                                            • Opcode ID: b4ba56fa1e1e9ac87559970e4cb8559b61bb56f2b90aa98a954b75f6be6f1458
                                                                                                                                                                                                                                            • Instruction ID: 309cfe37bdb2fc1be55667637d06bdd66c96b88143c0ab8e8ebe6b5a7ce06542
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b4ba56fa1e1e9ac87559970e4cb8559b61bb56f2b90aa98a954b75f6be6f1458
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7D21D675940214AFCB10DF64D981B6E77F8EF8A750F105065E905BF385D670AE40CBA1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E59BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E59BB2
                                                                                                                                                                                                                                            • GetCursorPos.USER32(?), ref: 00ED9001
                                                                                                                                                                                                                                            • TrackPopupMenuEx.USER32(?,00000000,?,?,?,00000000,?,00E97711,?,?,?,?,?), ref: 00ED9016
                                                                                                                                                                                                                                            • GetCursorPos.USER32(?), ref: 00ED905E
                                                                                                                                                                                                                                            • DefDlgProcW.USER32(?,0000007B,?,?,?,?,?,?,?,?,?,?,00E97711,?,?,?), ref: 00ED9094
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Cursor$LongMenuPopupProcTrackWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2864067406-0
                                                                                                                                                                                                                                            • Opcode ID: a248a83aac3353cd1fb5ab84f60589c43b972494792f128f6b922658c084b367
                                                                                                                                                                                                                                            • Instruction ID: 3ed1458825d1c45a46395cb4f9a43aee0cdd0a93b4e0801ffb99ebc8d2ca23de
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a248a83aac3353cd1fb5ab84f60589c43b972494792f128f6b922658c084b367
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 6121D331600018EFDB259F94EC58EFA3BB9FF49350F148156F905AB2A2C3759991EB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetFileAttributesW.KERNEL32(?,00EDCB68), ref: 00EAD2FB
                                                                                                                                                                                                                                            • GetLastError.KERNEL32 ref: 00EAD30A
                                                                                                                                                                                                                                            • CreateDirectoryW.KERNEL32(?,00000000), ref: 00EAD319
                                                                                                                                                                                                                                            • CreateDirectoryW.KERNEL32(?,00000000,00000000,000000FF,00EDCB68), ref: 00EAD376
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CreateDirectory$AttributesErrorFileLast
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2267087916-0
                                                                                                                                                                                                                                            • Opcode ID: ca7529efec5dd0261dfa50066d84bd69d1e7e49cb8db56b13543c2e1e2ea7c48
                                                                                                                                                                                                                                            • Instruction ID: 40d173e5158b41f47e16d46e50bc7579a6a149a65010d48e801b62e65f79e2b1
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ca7529efec5dd0261dfa50066d84bd69d1e7e49cb8db56b13543c2e1e2ea7c48
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 802194705097019F8700DF28D8814AE77E4EF5A358F205A1EF496EB2A1D730E94ACB93
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EA1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),?,00000000,?), ref: 00EA102A
                                                                                                                                                                                                                                              • Part of subcall function 00EA1014: GetLastError.KERNEL32(?,TokenIntegrityLevel,?,00000000,?), ref: 00EA1036
                                                                                                                                                                                                                                              • Part of subcall function 00EA1014: GetProcessHeap.KERNEL32(00000008,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EA1045
                                                                                                                                                                                                                                              • Part of subcall function 00EA1014: HeapAlloc.KERNEL32(00000000,?,TokenIntegrityLevel,?,00000000,?), ref: 00EA104C
                                                                                                                                                                                                                                              • Part of subcall function 00EA1014: GetTokenInformation.ADVAPI32(?,00000003(TokenIntegrityLevel),00000000,?,?,?,TokenIntegrityLevel,?,00000000,?), ref: 00EA1062
                                                                                                                                                                                                                                            • LookupPrivilegeValueW.ADVAPI32(00000000,?,?), ref: 00EA15BE
                                                                                                                                                                                                                                            • _memcmp.LIBVCRUNTIME ref: 00EA15E1
                                                                                                                                                                                                                                            • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00EA1617
                                                                                                                                                                                                                                            • HeapFree.KERNEL32(00000000), ref: 00EA161E
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Heap$InformationProcessToken$AllocErrorFreeLastLookupPrivilegeValue_memcmp
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1592001646-0
                                                                                                                                                                                                                                            • Opcode ID: dba0d55ccba0aaa211415d03495aa3ee3d0f557ea974e5f158b0ca3f21f72511
                                                                                                                                                                                                                                            • Instruction ID: a8581ba0c74e7e47cedb82923b4e3e9bff9cbd6b5fe0a3ad20cdd7a3b2490f82
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: dba0d55ccba0aaa211415d03495aa3ee3d0f557ea974e5f158b0ca3f21f72511
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 15218931E41109EFDF00DFA4C945BEEB7B8EF89348F184499E441BB241E730AA49CBA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(?,000000EC), ref: 00ED280A
                                                                                                                                                                                                                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00ED2824
                                                                                                                                                                                                                                            • SetWindowLongW.USER32(?,000000EC,00000000), ref: 00ED2832
                                                                                                                                                                                                                                            • SetLayeredWindowAttributes.USER32(?,00000000,?,00000002), ref: 00ED2840
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$Long$AttributesLayered
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2169480361-0
                                                                                                                                                                                                                                            • Opcode ID: ae162d81b9f4008645f6d9b354e739eb8616e96fe51040b5a2953b96c694cc81
                                                                                                                                                                                                                                            • Instruction ID: fc424cb0a44a6c89ea2019a5e362aa31ad4059bb799d4213c33426f16b4ba5b8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ae162d81b9f4008645f6d9b354e739eb8616e96fe51040b5a2953b96c694cc81
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D6213335205111AFD7149B24D840FAA7B9AEF95324F24924EF526AB3E2C771FC43C790
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00EA8D7D: lstrlenW.KERNEL32(?,00000002,000000FF,?,?,?,00EA790A,?,000000FF,?,00EA8754,00000000,?,0000001C,?,?), ref: 00EA8D8C
                                                                                                                                                                                                                                              • Part of subcall function 00EA8D7D: lstrcpyW.KERNEL32(00000000,?,?,00EA790A,?,000000FF,?,00EA8754,00000000,?,0000001C,?,?,00000000), ref: 00EA8DB2
                                                                                                                                                                                                                                              • Part of subcall function 00EA8D7D: lstrcmpiW.KERNEL32(00000000,?,00EA790A,?,000000FF,?,00EA8754,00000000,?,0000001C,?,?), ref: 00EA8DE3
                                                                                                                                                                                                                                            • lstrlenW.KERNEL32(?,00000002,000000FF,?,000000FF,?,00EA8754,00000000,?,0000001C,?,?,00000000), ref: 00EA7923
                                                                                                                                                                                                                                            • lstrcpyW.KERNEL32(00000000,?,?,00EA8754,00000000,?,0000001C,?,?,00000000), ref: 00EA7949
                                                                                                                                                                                                                                            • lstrcmpiW.KERNEL32(00000002,cdecl,?,00EA8754,00000000,?,0000001C,?,?,00000000), ref: 00EA7984
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: lstrcmpilstrcpylstrlen
                                                                                                                                                                                                                                            • String ID: cdecl
                                                                                                                                                                                                                                            • API String ID: 4031866154-3896280584
                                                                                                                                                                                                                                            • Opcode ID: 5a0863c2cba5ab1fb6463cbc8d6476e34cb77e1691db6ca5424b8475f0efc576
                                                                                                                                                                                                                                            • Instruction ID: 279e2aa856d7fc945494959a697949fcb21b8fe905f86b0adcddd466422e6562
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 5a0863c2cba5ab1fb6463cbc8d6476e34cb77e1691db6ca5424b8475f0efc576
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4411E43A201202AFCB159F35DC45D7B77E9EF8A394B10502BE982DB2A4EB31A811C791
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetWindowLongW.USER32(?,000000F0), ref: 00ED7D0B
                                                                                                                                                                                                                                            • SetWindowLongW.USER32(00000000,000000F0,?), ref: 00ED7D2A
                                                                                                                                                                                                                                            • SetWindowLongW.USER32(00000000,000000EC,000000FF), ref: 00ED7D42
                                                                                                                                                                                                                                            • SetWindowPos.USER32(00000000,00000000,00000000,00000000,00000000,00000000,?,?,?,?,?,?,?,?,00EBB7AD,00000000), ref: 00ED7D6B
                                                                                                                                                                                                                                              • Part of subcall function 00E59BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E59BB2
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$Long
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 847901565-0
                                                                                                                                                                                                                                            • Opcode ID: fcec1a5cf94dc6aba393990bb998d406c70fdcdb94a8bc9531f58cfa9a425a39
                                                                                                                                                                                                                                            • Instruction ID: 1437cfb19b1f96d7c790d72fe1d0ca409bed70d4da367617cf6ea2e54d6ed17d
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: fcec1a5cf94dc6aba393990bb998d406c70fdcdb94a8bc9531f58cfa9a425a39
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2111D5312056159FCB108F28DC04AA63BA5FF463B4B219726F975E72F0E730C952DB40
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001060,?,00000004), ref: 00ED56BB
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ED56CD
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00ED56D8
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001002,00000000,?), ref: 00ED5816
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend_wcslen
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 455545452-0
                                                                                                                                                                                                                                            • Opcode ID: 7d9cb05c3cb832c347efa68f8263423dd266ba43598b0bf44f5b77cf597a5089
                                                                                                                                                                                                                                            • Instruction ID: b7acd16da99bc6ebd977b3b96b9d3852be27e150291961c4a55df286e678c647
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 7d9cb05c3cb832c347efa68f8263423dd266ba43598b0bf44f5b77cf597a5089
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 98110A7264060996DB209F65DC81AFE37ACEF50764B10502BF926F6281E770C985CF61
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: b2e5c437d51421e5551404c10169221b634ea65545a398117ee295cc07d602bb
                                                                                                                                                                                                                                            • Instruction ID: 3470e3ee83f7b92b20a3af82d048777424f0e8323e579ae71857ff4bbe8dc0a8
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b2e5c437d51421e5551404c10169221b634ea65545a398117ee295cc07d602bb
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: F4017CB220A7163EFA2116787CC1F67666CDF813B9B35A36AF629B11D2DB608C405560
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000000B0,?,?), ref: 00EA1A47
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00EA1A59
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00EA1A6F
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000000C9,?,00000000), ref: 00EA1A8A
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3850602802-0
                                                                                                                                                                                                                                            • Opcode ID: 082d04152f05058cb34b8f7a4c2966d6dafd307dae1e73aa78a88413f6c0e4c4
                                                                                                                                                                                                                                            • Instruction ID: b1e8497cad4f14307a88400e4cdeb98964e23569a3f1dc9017fc982d8b87b13b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 082d04152f05058cb34b8f7a4c2966d6dafd307dae1e73aa78a88413f6c0e4c4
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 54110C3AD01219FFEB11DBA5CD85FADBB78EB09754F200091E604B7290D6716E50DB94
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00EAE1FD
                                                                                                                                                                                                                                            • MessageBoxW.USER32(?,?,?,?), ref: 00EAE230
                                                                                                                                                                                                                                            • WaitForSingleObject.KERNEL32(00000000,000000FF,?,?,?,?), ref: 00EAE246
                                                                                                                                                                                                                                            • CloseHandle.KERNEL32(00000000,?,?,?,?), ref: 00EAE24D
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CloseCurrentHandleMessageObjectSingleThreadWait
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2880819207-0
                                                                                                                                                                                                                                            • Opcode ID: daab476b080271b19e84f4b78fb21165fb82e7e694a57adb30fb0f96f2c8aea7
                                                                                                                                                                                                                                            • Instruction ID: cc0bad06e8bedfe9b91f018a894be50991c3ab03f2c24aa2224c502481f8a2e0
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: daab476b080271b19e84f4b78fb21165fb82e7e694a57adb30fb0f96f2c8aea7
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 26110872905259BFC7019BA8AC09BDE7FACEB46354F108256F924F7391D270DD0487B0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CreateThread.KERNEL32(00000000,?,00E6CFF9,00000000,00000004,00000000), ref: 00E6D218
                                                                                                                                                                                                                                            • GetLastError.KERNEL32 ref: 00E6D224
                                                                                                                                                                                                                                            • __dosmaperr.LIBCMT ref: 00E6D22B
                                                                                                                                                                                                                                            • ResumeThread.KERNEL32(00000000), ref: 00E6D249
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Thread$CreateErrorLastResume__dosmaperr
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 173952441-0
                                                                                                                                                                                                                                            • Opcode ID: b9713357dc2122f9a249756cdb567051a06fc89f159c10703d9309f5ddfc67f6
                                                                                                                                                                                                                                            • Instruction ID: 25677885a85a2323275547d7ea8a58aa67dfd9b2f949a518af8ae0217eabd9e0
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b9713357dc2122f9a249756cdb567051a06fc89f159c10703d9309f5ddfc67f6
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: FF012636E8A204BBC7115BA5FC05BAA3BA9DF813B0F205219F924B20E0CB70C901C6A0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E59BA1: GetWindowLongW.USER32(00000000,000000EB), ref: 00E59BB2
                                                                                                                                                                                                                                            • GetClientRect.USER32(?,?), ref: 00ED9F31
                                                                                                                                                                                                                                            • GetCursorPos.USER32(?), ref: 00ED9F3B
                                                                                                                                                                                                                                            • ScreenToClient.USER32(?,?), ref: 00ED9F46
                                                                                                                                                                                                                                            • DefDlgProcW.USER32(?,00000020,?,00000000,?,?,?), ref: 00ED9F7A
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Client$CursorLongProcRectScreenWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 4127811313-0
                                                                                                                                                                                                                                            • Opcode ID: bdc6bf76ea329cb2da865d4b716a45cdc72751a094e0c3220cefbb3ef0f27072
                                                                                                                                                                                                                                            • Instruction ID: a48fee5e1c303a6a5359a039c8c41a2a859e4040ad9dea50d7123bdd230e39c4
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: bdc6bf76ea329cb2da865d4b716a45cdc72751a094e0c3220cefbb3ef0f27072
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 96112532A0011AABDB109F69DC499FE77B9FB05311F500552F911F7242D330AA86CBA1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00E4604C
                                                                                                                                                                                                                                            • GetStockObject.GDI32(00000011), ref: 00E46060
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000030,00000000), ref: 00E4606A
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CreateMessageObjectSendStockWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3970641297-0
                                                                                                                                                                                                                                            • Opcode ID: b5783e0ad905217875550319bbf3773a7ea60fdde8e1b1d815613e0f9b47a3e3
                                                                                                                                                                                                                                            • Instruction ID: 26ec6ad9f68e3d952e3173739283a7e85fe79b4d4a87dcdc620ab66ff31fcb3e
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b5783e0ad905217875550319bbf3773a7ea60fdde8e1b1d815613e0f9b47a3e3
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7711C4B2502509BFEF224FA4EC44EEABB6DFF09395F101202FA1466010C732DC60DB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • ___BuildCatchObject.LIBVCRUNTIME ref: 00E63B56
                                                                                                                                                                                                                                              • Part of subcall function 00E63AA3: BuildCatchObjectHelperInternal.LIBVCRUNTIME ref: 00E63AD2
                                                                                                                                                                                                                                              • Part of subcall function 00E63AA3: ___AdjustPointer.LIBCMT ref: 00E63AED
                                                                                                                                                                                                                                            • _UnwindNestedFrames.LIBCMT ref: 00E63B6B
                                                                                                                                                                                                                                            • __FrameHandler3::FrameUnwindToState.LIBVCRUNTIME ref: 00E63B7C
                                                                                                                                                                                                                                            • CallCatchBlock.LIBVCRUNTIME ref: 00E63BA4
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Catch$BuildFrameObjectUnwind$AdjustBlockCallFramesHandler3::HelperInternalNestedPointerState
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 737400349-0
                                                                                                                                                                                                                                            • Opcode ID: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                            • Instruction ID: bcc0ba2ee1b9262ccddc979006d1de299d4340fdda2b3b72e4581ab4c3b30731
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 12ea49abee573113f57dbd3ec3a577afcc9c348439d29e6cbe32e78011ac24d3
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 88018C72140149BBDF125EA5EC42EEB3FADEF58798F045004FE4866121C732E961EBA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,00E413C6,00000000,00000000,?,00E7301A,00E413C6,00000000,00000000,00000000,?,00E7328B,00000006,FlsSetValue), ref: 00E730A5
                                                                                                                                                                                                                                            • GetLastError.KERNEL32(?,00E7301A,00E413C6,00000000,00000000,00000000,?,00E7328B,00000006,FlsSetValue,00EE2290,FlsSetValue,00000000,00000364,?,00E72E46), ref: 00E730B1
                                                                                                                                                                                                                                            • LoadLibraryExW.KERNEL32(00000000,00000000,00000000,?,00E7301A,00E413C6,00000000,00000000,00000000,?,00E7328B,00000006,FlsSetValue,00EE2290,FlsSetValue,00000000), ref: 00E730BF
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: LibraryLoad$ErrorLast
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3177248105-0
                                                                                                                                                                                                                                            • Opcode ID: 492e43957e03f317f6591a1216bf2ead11818b31cdd5c8966ef342e7ca15e91c
                                                                                                                                                                                                                                            • Instruction ID: 4ed08233c0a1dd1baa08a69a5f79447377f5317844673ada44cd45e898e277f6
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 492e43957e03f317f6591a1216bf2ead11818b31cdd5c8966ef342e7ca15e91c
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: A5014732342223AFCB704B79AC44A977B98EF05BA1B208321F909F3180CB21C945D6E0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetModuleFileNameW.KERNEL32(?,?,00000104,00000000), ref: 00EA747F
                                                                                                                                                                                                                                            • LoadTypeLibEx.OLEAUT32(?,00000002,?), ref: 00EA7497
                                                                                                                                                                                                                                            • RegisterTypeLib.OLEAUT32(?,?,00000000), ref: 00EA74AC
                                                                                                                                                                                                                                            • RegisterTypeLibForUser.OLEAUT32(?,?,00000000), ref: 00EA74CA
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Type$Register$FileLoadModuleNameUser
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1352324309-0
                                                                                                                                                                                                                                            • Opcode ID: 73cbb7f5b7c73d900c3724f7ff855f85503c0259e9532d6da9eee2723a46f5e2
                                                                                                                                                                                                                                            • Instruction ID: f7a3ad06131a26305a65de4f042a9f83841bd3fab32c458103c6da9a377d1b83
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 73cbb7f5b7c73d900c3724f7ff855f85503c0259e9532d6da9eee2723a46f5e2
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 6B11A1B12063119FE720CF14ED08BD27FFCEB09B44F10856AA6A6EA151D770F908DB50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00EAACD3,?,00008000), ref: 00EAB0C4
                                                                                                                                                                                                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00EAACD3,?,00008000), ref: 00EAB0E9
                                                                                                                                                                                                                                            • QueryPerformanceCounter.KERNEL32(?,?,?,?,?,?,?,?,?,00EAACD3,?,00008000), ref: 00EAB0F3
                                                                                                                                                                                                                                            • Sleep.KERNEL32(00000000,?,?,?,?,?,?,?,?,00EAACD3,?,00008000), ref: 00EAB126
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CounterPerformanceQuerySleep
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2875609808-0
                                                                                                                                                                                                                                            • Opcode ID: db4eac699b7c557d7d5379b3c93bcba3455a4bcbd9dbe1a281a4817f4fc5f85d
                                                                                                                                                                                                                                            • Instruction ID: 333d21db13c06685dd44166d9491f9d835b7f99c6eab77e5ba312c8bdac7f1fb
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: db4eac699b7c557d7d5379b3c93bcba3455a4bcbd9dbe1a281a4817f4fc5f85d
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 20118B30C0252DEBCF04AFE5E9A86EEBB78FF1E311F105096D981B6282CB306650CB51
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetWindowRect.USER32(?,?), ref: 00ED7E33
                                                                                                                                                                                                                                            • ScreenToClient.USER32(?,?), ref: 00ED7E4B
                                                                                                                                                                                                                                            • ScreenToClient.USER32(?,?), ref: 00ED7E6F
                                                                                                                                                                                                                                            • InvalidateRect.USER32(?,?,?,?,?,?,?,?,?,?,?,?), ref: 00ED7E8A
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ClientRectScreen$InvalidateWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 357397906-0
                                                                                                                                                                                                                                            • Opcode ID: 1702e718e75c46a069e4fce8d4563cabe30adec5993ef539593f2cb79f4de887
                                                                                                                                                                                                                                            • Instruction ID: 4f4c9e6618d67cdc6253bda1589157e603c62c4f9adf12a4ed51cd926888d231
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 1702e718e75c46a069e4fce8d4563cabe30adec5993ef539593f2cb79f4de887
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 331156B9D0020AAFDB41CFA9D884AEEBBF5FF08350F505166E915E3210D735AA55CF50
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageTimeoutW.USER32(?,00000000,00000000,00000000,00000002,00001388,?), ref: 00EA2DC5
                                                                                                                                                                                                                                            • GetWindowThreadProcessId.USER32(?,00000000), ref: 00EA2DD6
                                                                                                                                                                                                                                            • GetCurrentThreadId.KERNEL32 ref: 00EA2DDD
                                                                                                                                                                                                                                            • AttachThreadInput.USER32(00000000,?,00000000,00000000), ref: 00EA2DE4
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Thread$AttachCurrentInputMessageProcessSendTimeoutWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2710830443-0
                                                                                                                                                                                                                                            • Opcode ID: 827055fed8b2548c5a5bb4220fa5203504b6e50d5d3464af7464e30e83e3556c
                                                                                                                                                                                                                                            • Instruction ID: 81001c7a6a29458d410d2c183386fd63c018ddbca9a45d26b4b5b471622a070f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 827055fed8b2548c5a5bb4220fa5203504b6e50d5d3464af7464e30e83e3556c
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: F9E06D711022257BDB201B67AC0DEEB3F6CEF47FA1F10101AB606F90819AA4D884C6B0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E59639: ExtCreatePen.GDI32(?,?,00000000,00000000,00000000,?,00000000), ref: 00E59693
                                                                                                                                                                                                                                              • Part of subcall function 00E59639: SelectObject.GDI32(?,00000000), ref: 00E596A2
                                                                                                                                                                                                                                              • Part of subcall function 00E59639: BeginPath.GDI32(?), ref: 00E596B9
                                                                                                                                                                                                                                              • Part of subcall function 00E59639: SelectObject.GDI32(?,00000000), ref: 00E596E2
                                                                                                                                                                                                                                            • MoveToEx.GDI32(?,00000000,00000000,00000000), ref: 00ED8887
                                                                                                                                                                                                                                            • LineTo.GDI32(?,?,?), ref: 00ED8894
                                                                                                                                                                                                                                            • EndPath.GDI32(?), ref: 00ED88A4
                                                                                                                                                                                                                                            • StrokePath.GDI32(?), ref: 00ED88B2
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Path$ObjectSelect$BeginCreateLineMoveStroke
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1539411459-0
                                                                                                                                                                                                                                            • Opcode ID: 3d0c14fd00eb59fc1fff8cdb5bcbc90c7f6c9e2ae5db48f7d6bae67647f96211
                                                                                                                                                                                                                                            • Instruction ID: 135e4c0c619938c97b6be694ba8098f23fb721e73ff772a6e48790f53c55cf30
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 3d0c14fd00eb59fc1fff8cdb5bcbc90c7f6c9e2ae5db48f7d6bae67647f96211
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 1CF09A36002259FADB121F95AC09FCE3B69AF06310F508002FA11710E2C7B51515DBE5
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetSysColor.USER32(00000008), ref: 00E598CC
                                                                                                                                                                                                                                            • SetTextColor.GDI32(?,?), ref: 00E598D6
                                                                                                                                                                                                                                            • SetBkMode.GDI32(?,00000001), ref: 00E598E9
                                                                                                                                                                                                                                            • GetStockObject.GDI32(00000005), ref: 00E598F1
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Color$ModeObjectStockText
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 4037423528-0
                                                                                                                                                                                                                                            • Opcode ID: b9b6f4387e5de3d0ff1cfc0aefef34a35ffebd8f815b4059762c6b01ff9f77ae
                                                                                                                                                                                                                                            • Instruction ID: d2ec47e0fc8a638f9833a677932d183443f589799a7b41c3affb7d25300d2a30
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b9b6f4387e5de3d0ff1cfc0aefef34a35ffebd8f815b4059762c6b01ff9f77ae
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: F8E06531245251AEDF215B75BC09BD83F21EB11376F14821AF6F9640E1C3714648DB10
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetCurrentThread.KERNEL32 ref: 00EA1634
                                                                                                                                                                                                                                            • OpenThreadToken.ADVAPI32(00000000,?,?,?,00EA11D9), ref: 00EA163B
                                                                                                                                                                                                                                            • GetCurrentProcess.KERNEL32(00000028,?,?,?,?,00EA11D9), ref: 00EA1648
                                                                                                                                                                                                                                            • OpenProcessToken.ADVAPI32(00000000,?,?,?,00EA11D9), ref: 00EA164F
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CurrentOpenProcessThreadToken
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3974789173-0
                                                                                                                                                                                                                                            • Opcode ID: 024cfddb878e58993d49d6bc6d1b636aa0ab3c93b2e1259137531a040df79714
                                                                                                                                                                                                                                            • Instruction ID: a0776455a6acb6ca12f7a12047889efb78c4d13742cfebd2696ccd48d49421bd
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 024cfddb878e58993d49d6bc6d1b636aa0ab3c93b2e1259137531a040df79714
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 4CE04F316022129FD7201BA2AE0DB463B68EF457E5F244849F245E9090E6245449C750
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetDesktopWindow.USER32 ref: 00E9D858
                                                                                                                                                                                                                                            • GetDC.USER32(00000000), ref: 00E9D862
                                                                                                                                                                                                                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00E9D882
                                                                                                                                                                                                                                            • ReleaseDC.USER32(?), ref: 00E9D8A3
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2889604237-0
                                                                                                                                                                                                                                            • Opcode ID: 0ba61739e30bf54ddca0fd94e7f75f8560201a895a6ea3eb94bbaaadebc57e12
                                                                                                                                                                                                                                            • Instruction ID: ba4352ae397a10076e9d6489bbf4645241e754a13a9961ca606127c2e1bf5a3b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 0ba61739e30bf54ddca0fd94e7f75f8560201a895a6ea3eb94bbaaadebc57e12
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 26E01AB0805206DFCF519FA1EC0866DBBF2FB08751F28A40AE816F7250C738890AEF40
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetDesktopWindow.USER32 ref: 00E9D86C
                                                                                                                                                                                                                                            • GetDC.USER32(00000000), ref: 00E9D876
                                                                                                                                                                                                                                            • GetDeviceCaps.GDI32(00000000,0000000C), ref: 00E9D882
                                                                                                                                                                                                                                            • ReleaseDC.USER32(?), ref: 00E9D8A3
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CapsDesktopDeviceReleaseWindow
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 2889604237-0
                                                                                                                                                                                                                                            • Opcode ID: 30260d566edd4a357adb12f796ef747985aa59350e96cf38c2f9f74232d18c27
                                                                                                                                                                                                                                            • Instruction ID: b75b238e1c4f6b84fc62bbbfc64e731d555d32cb06f5444c90130940517ea50b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 30260d566edd4a357adb12f796ef747985aa59350e96cf38c2f9f74232d18c27
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 58E01A70801201DFCB509FA1E80866DBBF1FB08751B28940AE816F7250C738990ADF40
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E47620: _wcslen.LIBCMT ref: 00E47625
                                                                                                                                                                                                                                            • WNetUseConnectionW.MPR(00000000,?,0000002A,00000000,?,?,0000002A,?), ref: 00EB4ED4
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Connection_wcslen
                                                                                                                                                                                                                                            • String ID: *$LPT
                                                                                                                                                                                                                                            • API String ID: 1725874428-3443410124
                                                                                                                                                                                                                                            • Opcode ID: b93d1038aae5c04d4c4e406af5b544a4888b87fedfdc56fa50dcb8dab61ef718
                                                                                                                                                                                                                                            • Instruction ID: cfd71b008700ca13c39de1f7ec06447231271cfcd75a61f94c1e6ed5c412b3f2
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: b93d1038aae5c04d4c4e406af5b544a4888b87fedfdc56fa50dcb8dab61ef718
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: F69142B5A002149FCB14DF54C484EEABBF5BF44308F19A099E84AAF3A2D735ED45CB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • __startOneArgErrorHandling.LIBCMT ref: 00E6E30D
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ErrorHandling__start
                                                                                                                                                                                                                                            • String ID: pow
                                                                                                                                                                                                                                            • API String ID: 3213639722-2276729525
                                                                                                                                                                                                                                            • Opcode ID: 0e9a6a809e343a3e576b98a7430d99e2fc954301ad1a78fe3f0644f21c9dbb12
                                                                                                                                                                                                                                            • Instruction ID: f9bb4e9889ae3215ea856af48b9e51222afadd59f3abe0f9cefab0bd3f86cf17
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 0e9a6a809e343a3e576b98a7430d99e2fc954301ad1a78fe3f0644f21c9dbb12
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: F6518065A8C20696CB257B14D9413BA3BD8EB407C4F30F95CF0D9B63E9DF308C959A86
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID: #
                                                                                                                                                                                                                                            • API String ID: 0-1885708031
                                                                                                                                                                                                                                            • Opcode ID: 0c705a103237629ae7ba233f1e0e1fa303b508dfe717039fece017e0011277ec
                                                                                                                                                                                                                                            • Instruction ID: 0e346a94bc2b67c75d30021fad6849d385f60df6463aa7d8f3a7ec1488813c65
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 0c705a103237629ae7ba233f1e0e1fa303b508dfe717039fece017e0011277ec
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: CC511F35904206DEDF18DFA8C0816FA7BA8EF15314F246856ED91BB390D6309E86CBA1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • Sleep.KERNEL32(00000000), ref: 00E5F2A2
                                                                                                                                                                                                                                            • GlobalMemoryStatusEx.KERNEL32(?), ref: 00E5F2BB
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: GlobalMemorySleepStatus
                                                                                                                                                                                                                                            • String ID: @
                                                                                                                                                                                                                                            • API String ID: 2783356886-2766056989
                                                                                                                                                                                                                                            • Opcode ID: 7316116f2896bb166389c4025699dd7109cf37f7fafd2711b49f87fe079c5a4b
                                                                                                                                                                                                                                            • Instruction ID: 7947a6dcedf0b2a909d11ce490598b4a3831c176922d1363f96648b27449fee2
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 7316116f2896bb166389c4025699dd7109cf37f7fafd2711b49f87fe079c5a4b
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C85156715097489BD320AF51EC86BABBBF8FF84300F91884DF1D9611A5EB318529CB67
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • CharUpperBuffW.USER32(?,?,?,00000003,?,?), ref: 00EC57E0
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EC57EC
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: BuffCharUpper_wcslen
                                                                                                                                                                                                                                            • String ID: CALLARGARRAY
                                                                                                                                                                                                                                            • API String ID: 157775604-1150593374
                                                                                                                                                                                                                                            • Opcode ID: 317e43e1cd7bda306bb29f0cc2683bc66514841eb9cb6a817249b9c9a78bf2b3
                                                                                                                                                                                                                                            • Instruction ID: aa31f90762ecf853725af5829bd9ab4627bae54f905d97feefe91c543d45f42f
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 317e43e1cd7bda306bb29f0cc2683bc66514841eb9cb6a817249b9c9a78bf2b3
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 75417F32A002059FCB18DFA8C982DAEBBF5EF59354B14606DF515B7251D731AD82CBA0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EBD130
                                                                                                                                                                                                                                            • InternetCrackUrlW.WININET(?,00000000,00000000,0000007C), ref: 00EBD13A
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CrackInternet_wcslen
                                                                                                                                                                                                                                            • String ID: |
                                                                                                                                                                                                                                            • API String ID: 596671847-2343686810
                                                                                                                                                                                                                                            • Opcode ID: ef46ab4ea963801ed14de2f674b7167030f31a1179d0624f9095edb15f572459
                                                                                                                                                                                                                                            • Instruction ID: 9e29d86a8b50da7e2d28df3774bd56f4ca26776f58f60cb4ed09fb040e8e1ecc
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ef46ab4ea963801ed14de2f674b7167030f31a1179d0624f9095edb15f572459
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: A3311871D01219ABCF15EFA4DC85AEFBFB9FF09344F101019E815B6162EB31AA06DB61
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • DestroyWindow.USER32(?,?,?,?), ref: 00ED3621
                                                                                                                                                                                                                                            • MoveWindow.USER32(?,?,?,?,?,00000001,?,?,?), ref: 00ED365C
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$DestroyMove
                                                                                                                                                                                                                                            • String ID: static
                                                                                                                                                                                                                                            • API String ID: 2139405536-2160076837
                                                                                                                                                                                                                                            • Opcode ID: 9e7802871b33ec0bc1befc819462bcaab08d7a1f2cc490d1d3dc4776adc94521
                                                                                                                                                                                                                                            • Instruction ID: bd377ffa44ca0ae24d931270e5e5e9c1b6c95a989c953e7171f96a4c0e9f34b7
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 9e7802871b33ec0bc1befc819462bcaab08d7a1f2cc490d1d3dc4776adc94521
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: AA319071110604AEDB20DF38DC41EFB73A9FF48764F10A61AF9A5A7280DA31ED82D761
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000027,00001132,00000000,?), ref: 00ED461F
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00001105,00000000,00000000), ref: 00ED4634
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend
                                                                                                                                                                                                                                            • String ID: '
                                                                                                                                                                                                                                            • API String ID: 3850602802-1997036262
                                                                                                                                                                                                                                            • Opcode ID: eaab1231e63d7d4fba61b9f057d594300d7f5743eef435ae8789e7331dd9fe24
                                                                                                                                                                                                                                            • Instruction ID: 3acbf01f238a222087ab89312cbe3ce6d97a111fefc7a8f45f4aeb2453246b23
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: eaab1231e63d7d4fba61b9f057d594300d7f5743eef435ae8789e7331dd9fe24
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 9D3136B4A0120A9FDF14CFA9D981BDABBB5FF19304F14506AE915AB381D770E942CF90
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • SendMessageW.USER32(00000000,00000143,00000000,?), ref: 00ED327C
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000014E,00000000,00000000), ref: 00ED3287
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: MessageSend
                                                                                                                                                                                                                                            • String ID: Combobox
                                                                                                                                                                                                                                            • API String ID: 3850602802-2096851135
                                                                                                                                                                                                                                            • Opcode ID: 97df0d6d33b01a9c9c96153b6388d6b977e2a9ba987de7522c82473feacf9526
                                                                                                                                                                                                                                            • Instruction ID: bc2a86d4a7ce17867ffd0ce45cd9b9d21114241a04bf824fa4a1e5f3cf0fd0d3
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 97df0d6d33b01a9c9c96153b6388d6b977e2a9ba987de7522c82473feacf9526
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B611E6717002087FEF219E64DC80EBB375BEB54368F105126F514A73A0D631DD529761
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E4600E: CreateWindowExW.USER32(?,?,?,?,?,?,?,?,?,?,00000000,?), ref: 00E4604C
                                                                                                                                                                                                                                              • Part of subcall function 00E4600E: GetStockObject.GDI32(00000011), ref: 00E46060
                                                                                                                                                                                                                                              • Part of subcall function 00E4600E: SendMessageW.USER32(00000000,00000030,00000000), ref: 00E4606A
                                                                                                                                                                                                                                            • GetWindowRect.USER32(00000000,?), ref: 00ED377A
                                                                                                                                                                                                                                            • GetSysColor.USER32(00000012), ref: 00ED3794
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Window$ColorCreateMessageObjectRectSendStock
                                                                                                                                                                                                                                            • String ID: static
                                                                                                                                                                                                                                            • API String ID: 1983116058-2160076837
                                                                                                                                                                                                                                            • Opcode ID: 098288a9121bba36e2dc249e83ccfb15e470f3bda34828314007283d75e5178b
                                                                                                                                                                                                                                            • Instruction ID: c8cf64924c723a1720f81c760165d343c21dbfabb677c207a46dfe6e84a58cac
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 098288a9121bba36e2dc249e83ccfb15e470f3bda34828314007283d75e5178b
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 531156B261020AAFDF00DFB8DC46AEA7BF8FB08354F005926F955E2250E735E811DB60
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • InternetOpenW.WININET(?,00000000,00000000,00000000,00000000), ref: 00EBCD7D
                                                                                                                                                                                                                                            • InternetSetOptionW.WININET(00000000,00000032,?,00000008), ref: 00EBCDA6
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Internet$OpenOption
                                                                                                                                                                                                                                            • String ID: <local>
                                                                                                                                                                                                                                            • API String ID: 942729171-4266983199
                                                                                                                                                                                                                                            • Opcode ID: f8b5c3d5059409741ae00ba3c945bf57dc49b9b63236e1aca839881d5b9bee53
                                                                                                                                                                                                                                            • Instruction ID: 4598f9587df83011c28640f385effd09bb292665bd3175198b70fd09f73ec428
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: f8b5c3d5059409741ae00ba3c945bf57dc49b9b63236e1aca839881d5b9bee53
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2A11C6792096327AD7344B668C45EE7BE6CEF527A8F60522AB149A3080D7709845D6F0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetWindowTextLengthW.USER32(00000000), ref: 00ED34AB
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000000B1,00000000,00000000), ref: 00ED34BA
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: LengthMessageSendTextWindow
                                                                                                                                                                                                                                            • String ID: edit
                                                                                                                                                                                                                                            • API String ID: 2978978980-2167791130
                                                                                                                                                                                                                                            • Opcode ID: 5f30f6050efc630e1cdc681154858fe26a1ffcbb6b964a13a26cfb9ed1d91c91
                                                                                                                                                                                                                                            • Instruction ID: b5d35a4dbbea7d50cf90bb37105df8ee202284ede228c9b4fb240279d340c708
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 5f30f6050efc630e1cdc681154858fe26a1ffcbb6b964a13a26cfb9ed1d91c91
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 19118F71100208AFEF214E74EC44AEB37AAEB05778F606326F971A32D0C779DC569752
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                            • CharUpperBuffW.USER32(?,?,?), ref: 00EA6CB6
                                                                                                                                                                                                                                            • _wcslen.LIBCMT ref: 00EA6CC2
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen$BuffCharUpper
                                                                                                                                                                                                                                            • String ID: STOP
                                                                                                                                                                                                                                            • API String ID: 1256254125-2411985666
                                                                                                                                                                                                                                            • Opcode ID: 02c6ea1d6a59916bbb2a9829f9f87cd0bf80edd5e9b8a908e00e5e5a7ac3b149
                                                                                                                                                                                                                                            • Instruction ID: 8d8e8ae0e85dd5e8c5b6a0d360f718f22fb76c80889b6d4294fe085614bd8705
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 02c6ea1d6a59916bbb2a9829f9f87cd0bf80edd5e9b8a908e00e5e5a7ac3b149
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B20108326005278BCB20AFBDDC809BF73F4EF6B7647151924E462BA195EA31E900C650
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                              • Part of subcall function 00EA3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00EA3CCA
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,000001A2,000000FF,?), ref: 00EA1D4C
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                            • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                            • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                            • Opcode ID: ea33eddc187e917535488184a96e17666a7c04bac5d381ee2d1e9c9ad690ef51
                                                                                                                                                                                                                                            • Instruction ID: 9290958704025a967a23dd35ae0de3e910e8d13fcb24479d18c9d7117d3bbbe6
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ea33eddc187e917535488184a96e17666a7c04bac5d381ee2d1e9c9ad690ef51
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2301DD75A411146BCB08EBA4DC55CFFB7A8EB4B750F141559F8327B2C2DA3069089661
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                              • Part of subcall function 00EA3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00EA3CCA
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000180,00000000,?), ref: 00EA1C46
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                            • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                            • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                            • Opcode ID: ec8faf27040514b6bb632098e07a93da6d445bf5f334e9b4df4034ea26cb5d01
                                                                                                                                                                                                                                            • Instruction ID: 5c2e13396629d93e2da47827307ef6c3bcd78d1d7a0c082cdde3d122b0ca2f4b
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ec8faf27040514b6bb632098e07a93da6d445bf5f334e9b4df4034ea26cb5d01
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: C501FC75AC110466CB08E7A0DD51AFFF7E89B1A350F102015B4067B1C2EA20AE0CD6B2
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                              • Part of subcall function 00EA3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00EA3CCA
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,00000182,?,00000000), ref: 00EA1CC8
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                            • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                            • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                            • Opcode ID: 30b671a2c9114b2a0fe6177ccfb1bb7ff11e1ce0b128efb3b10b5fb3a18a6aec
                                                                                                                                                                                                                                            • Instruction ID: e92989d0edaf5264cdcb1d7cdcba3caf58f19e7fe0bfe2a1950a78c280db5c09
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 30b671a2c9114b2a0fe6177ccfb1bb7ff11e1ce0b128efb3b10b5fb3a18a6aec
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 2B01DBB5A8111467CF08E7A4DE41AFFF7E89F1A750F142015B80177282EA60AF08D6B2
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E49CB3: _wcslen.LIBCMT ref: 00E49CBD
                                                                                                                                                                                                                                              • Part of subcall function 00EA3CA7: GetClassNameW.USER32(?,?,000000FF), ref: 00EA3CCA
                                                                                                                                                                                                                                            • SendMessageW.USER32(?,0000018B,00000000,00000000), ref: 00EA1DD3
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ClassMessageNameSend_wcslen
                                                                                                                                                                                                                                            • String ID: ComboBox$ListBox
                                                                                                                                                                                                                                            • API String ID: 624084870-1403004172
                                                                                                                                                                                                                                            • Opcode ID: 70f430e988bb80531f26d442ef09d7b0766cac8c09f4d1385e1268842e8dfb86
                                                                                                                                                                                                                                            • Instruction ID: 537a94fb0bf7134c2acb020c152d94b589ce99bdae6aa537d28ddabd01a32ccb
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 70f430e988bb80531f26d442ef09d7b0766cac8c09f4d1385e1268842e8dfb86
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: E6F0A971E4121466D704F7A4DD51AFFB7A8AF0A750F142915B422772C2DA60A9089661
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: _wcslen
                                                                                                                                                                                                                                            • String ID: 3, 3, 16, 1
                                                                                                                                                                                                                                            • API String ID: 176396367-3042988571
                                                                                                                                                                                                                                            • Opcode ID: 03e3b5fb4c48b5f3f9cf5b25ad3bc8cdadcc595fe2a2c25878b18e8d38cf900e
                                                                                                                                                                                                                                            • Instruction ID: 50301d8d6cd767563261378fef792c9ca4ba072525ea2120f104ef47c695cc4c
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 03e3b5fb4c48b5f3f9cf5b25ad3bc8cdadcc595fe2a2c25878b18e8d38cf900e
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: B4E023416847111093351275ADC1F7F56C9EFC5790710381FF5D1E1196D655CD9353A1
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • MessageBoxW.USER32(00000000,Error allocating memory.,AutoIt,00000010), ref: 00EA0B23
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Message
                                                                                                                                                                                                                                            • String ID: AutoIt$Error allocating memory.
                                                                                                                                                                                                                                            • API String ID: 2030045667-4017498283
                                                                                                                                                                                                                                            • Opcode ID: ce6286f979bd50e230b3626fc5c9b925156b2c0a6dd4f421a1f73783955b0ece
                                                                                                                                                                                                                                            • Instruction ID: e02906922190620d2630f565ddb89958b4c7d4ea1802f2865b0aa297685611f9
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: ce6286f979bd50e230b3626fc5c9b925156b2c0a6dd4f421a1f73783955b0ece
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: FEE0D8312843092AD2143754BC03F897BC4CF05FA1F201427FB48795C38AD2645096AA
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                              • Part of subcall function 00E5F7C9: InitializeCriticalSectionAndSpinCount.KERNEL32(?,00000000,?,00E60D71,?,?,?,00E4100A), ref: 00E5F7CE
                                                                                                                                                                                                                                            • IsDebuggerPresent.KERNEL32(?,?,?,00E4100A), ref: 00E60D75
                                                                                                                                                                                                                                            • OutputDebugStringW.KERNEL32(ERROR : Unable to initialize critical section in CAtlBaseModule,?,?,?,00E4100A), ref: 00E60D84
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00E60D7F
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: CountCriticalDebugDebuggerInitializeOutputPresentSectionSpinString
                                                                                                                                                                                                                                            • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
                                                                                                                                                                                                                                            • API String ID: 55579361-631824599
                                                                                                                                                                                                                                            • Opcode ID: 2354b399bc05fb1f5134adaf6967352b64075e8d8517b788689fb26b5d0b1675
                                                                                                                                                                                                                                            • Instruction ID: 2cf56bbf3dc93a1ba0754b34027d93944ff84448aceecd2361d7fa20997a3d2a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 2354b399bc05fb1f5134adaf6967352b64075e8d8517b788689fb26b5d0b1675
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 48E06D702007118FD320DFB9F4043427BE4EB14795F009A2EE886E6765DBB0E448CB91
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • GetTempPathW.KERNEL32(00000104,?,00000001), ref: 00EB302F
                                                                                                                                                                                                                                            • GetTempFileNameW.KERNEL32(?,aut,00000000,?), ref: 00EB3044
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: Temp$FileNamePath
                                                                                                                                                                                                                                            • String ID: aut
                                                                                                                                                                                                                                            • API String ID: 3285503233-3010740371
                                                                                                                                                                                                                                            • Opcode ID: 90d190593a44918596161014c23cc717ae715431e2aaa29c13d85cb138f084f0
                                                                                                                                                                                                                                            • Instruction ID: aae1dcb79f1b4d651246a440150005793c99785265ecbe46acd2a05e95d67987
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 90d190593a44918596161014c23cc717ae715431e2aaa29c13d85cb138f084f0
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 75D05B71501314AFDA20A795AC0DFC73B6CD704750F000252B655E20E1DAB4D544CAD0
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: LocalTime
                                                                                                                                                                                                                                            • String ID: %.3d$X64
                                                                                                                                                                                                                                            • API String ID: 481472006-1077770165
                                                                                                                                                                                                                                            • Opcode ID: edef71415f64599753d4925bd53ba4c4286924dd6b910c77c7402e7233677155
                                                                                                                                                                                                                                            • Instruction ID: f65e2e8403e43f9de52d53cee7b2df8aeb97dd0a3ce9ccac959c6d5a3cf928b7
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: edef71415f64599753d4925bd53ba4c4286924dd6b910c77c7402e7233677155
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: EBD06265C0D129E9CF9097D0DD459F9B3BCEB18341F60A852FD06B1090E624D54CA761
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00ED236C
                                                                                                                                                                                                                                            • PostMessageW.USER32(00000000), ref: 00ED2373
                                                                                                                                                                                                                                              • Part of subcall function 00EAE97B: Sleep.KERNEL32 ref: 00EAE9F3
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                            • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                            • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                            • Opcode ID: 8c604eb89821278880b7e3bb2d16ac5e445d952872d8e579169a0a261c4c9bfb
                                                                                                                                                                                                                                            • Instruction ID: fbc4acc27eb417b4e67923079191bb5cb28732ff265923e0af09d43453abc8f3
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: 8c604eb89821278880b7e3bb2d16ac5e445d952872d8e579169a0a261c4c9bfb
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 90D0C9323823117AEA64A771AC0FFCA76589B45B50F1049167655FA1D0C9A0B805CA55
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • FindWindowW.USER32(Shell_TrayWnd,00000000), ref: 00ED232C
                                                                                                                                                                                                                                            • PostMessageW.USER32(00000000,00000111,00000197,00000000), ref: 00ED233F
                                                                                                                                                                                                                                              • Part of subcall function 00EAE97B: Sleep.KERNEL32 ref: 00EAE9F3
                                                                                                                                                                                                                                            Strings
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: FindMessagePostSleepWindow
                                                                                                                                                                                                                                            • String ID: Shell_TrayWnd
                                                                                                                                                                                                                                            • API String ID: 529655941-2988720461
                                                                                                                                                                                                                                            • Opcode ID: fd3bf77bd4edecb9e8c696050d8e34d7aec3dd52350d801c42c5cf08ce024b43
                                                                                                                                                                                                                                            • Instruction ID: 8045392fc2e695a8890c6b59cccdb03a07225d4fcea5dd817d7eb4cdaa533834
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: fd3bf77bd4edecb9e8c696050d8e34d7aec3dd52350d801c42c5cf08ce024b43
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: D1D0A932381310BAEA64A331AC0FFCA7A489B00B00F1009027205BA1D0C9A0A804CA00
                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000009,?,00000000,00000000,?,?,?,00000000,?,?,?,?,?,00000000,?), ref: 00E7BE93
                                                                                                                                                                                                                                            • GetLastError.KERNEL32 ref: 00E7BEA1
                                                                                                                                                                                                                                            • MultiByteToWideChar.KERNEL32(?,00000001,?,?,00000000,?), ref: 00E7BEFC
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000000.00000002.1701609658.0000000000E41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00E40000, based on PE: true
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701586296.0000000000E40000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000EDC000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701689918.0000000000F02000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701754545.0000000000F0C000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            • Associated: 00000000.00000002.1701781712.0000000000F14000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_0_2_e40000_file.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: ByteCharMultiWide$ErrorLast
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 1717984340-0
                                                                                                                                                                                                                                            • Opcode ID: e0c8f7bebfac49cffeef9b79875f85a7b546cb70c849af2b7f65ee0c626a372d
                                                                                                                                                                                                                                            • Instruction ID: ba0baa95fb0c4b1897bd14294864ef0be6c901c489c0665f19a40e3e03bce114
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: e0c8f7bebfac49cffeef9b79875f85a7b546cb70c849af2b7f65ee0c626a372d
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: A841F634701216AFCF258F65DC54BBA7BA4EF41B54F24A16AF95DBB2A1DB308C00DB50
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 0000000D.00000003.1754413454.00000350FF781000.00000020.00000800.00020000.00000000.sdmp, Offset: 00000350FF781000, based on PE: false
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_13_3_350ff781000_firefox.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID:
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID:
                                                                                                                                                                                                                                            • Opcode ID: e7e0eda3f5e386382c5f9a18d8db78fe2e27b23d603813a81d30b82e7fc17a83
                                                                                                                                                                                                                                            • Instruction ID: 0a94ca1e4f23b2f7e44036f164897f52c66174b9e64af5255929c2ef7439084a
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: e7e0eda3f5e386382c5f9a18d8db78fe2e27b23d603813a81d30b82e7fc17a83
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 7511A030204F0C9FCF6ADF28D8C4B58B7E5FF69345F240299E505DB296C6329944CBA1

                                                                                                                                                                                                                                            Execution Graph

                                                                                                                                                                                                                                            Execution Coverage:0.3%
                                                                                                                                                                                                                                            Dynamic/Decrypted Code Coverage:0%
                                                                                                                                                                                                                                            Signature Coverage:100%
                                                                                                                                                                                                                                            Total number of Nodes:6
                                                                                                                                                                                                                                            Total number of Limit Nodes:0
                                                                                                                                                                                                                                            execution_graph 5002 208cb6a75f7 5003 208cb6a7607 NtQuerySystemInformation 5002->5003 5004 208cb6a75a4 5003->5004 5005 208cb6c60b2 5006 208cb6c6109 NtQuerySystemInformation 5005->5006 5007 208cb6c4484 5005->5007 5006->5007

                                                                                                                                                                                                                                            Callgraph

                                                                                                                                                                                                                                            APIs
                                                                                                                                                                                                                                            Memory Dump Source
                                                                                                                                                                                                                                            • Source File: 00000010.00000002.3501494895.00000208CB6A5000.00000020.00000001.00020000.00000000.sdmp, Offset: 00000208CB6A5000, based on PE: false
                                                                                                                                                                                                                                            Joe Sandbox IDA Plugin
                                                                                                                                                                                                                                            • Snapshot File: hcaresult_16_2_208cb6a5000_firefox.jbxd
                                                                                                                                                                                                                                            Similarity
                                                                                                                                                                                                                                            • API ID: InformationQuerySystem
                                                                                                                                                                                                                                            • String ID:
                                                                                                                                                                                                                                            • API String ID: 3562636166-0
                                                                                                                                                                                                                                            • Opcode ID: a3d4a310f25344abd1978f5247c9d082b9ccbb3eaa73dfa71153365510a96fee
                                                                                                                                                                                                                                            • Instruction ID: b01b878b69d13da21ef5225492aace02a94daa9053f623120d3cbe4cfed57603
                                                                                                                                                                                                                                            • Opcode Fuzzy Hash: a3d4a310f25344abd1978f5247c9d082b9ccbb3eaa73dfa71153365510a96fee
                                                                                                                                                                                                                                            • Instruction Fuzzy Hash: 63A3C731614B498BEB2DDF28DC857AA77F5FB55300F14822ED987C7252DF34EA428A81